Advanced Networks Assignment Solution

Verified

Added on  2021/06/17

|19
|3431
|43
AI Summary

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: ADVANCED NETWORKS
Advanced Networks
Name of the Student
Name of the University
Author’s Note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
ADVANCED NETWORKS
Table of Contents
Part 1 – Design...........................................................................................................................2
1. Discussing the network model and the business requirement............................................2
1.1. Background of the organization..................................................................................2
1.2. Goals and Objectives of the Project............................................................................2
2. Logical Design...................................................................................................................3
3. Associated Design Documents...........................................................................................5
Part 2 – Report...........................................................................................................................7
Introduction............................................................................................................................7
Layer 3 architecture................................................................................................................7
Protocols and Devices..........................................................................................................10
Protocols...........................................................................................................................10
Network Hardware Devices.............................................................................................11
Backup Solution...................................................................................................................13
Intrusion Prevention System................................................................................................13
Intrusion detection system....................................................................................................13
Port Security.........................................................................................................................14
Access control List...............................................................................................................14
Protocol Filtering.................................................................................................................14
Conclusion............................................................................................................................15
Bibliography.............................................................................................................................16
Document Page
2
ADVANCED NETWORKS
Part 1 – Design
1. Discussing the network model and the business requirement
1.1. Background of the organization
UKF Trading Company is a financial organization with its base in Birmingham,
Manchester and Edinburgh. There are different business organization that gets their service
from UKF Trading and the company have the requirement to expand their current network in
order to serve the growing needs of their customers. For the expansion of the organization the
company needs to relocate the headquarter to a large space and design a network to connect
all the workspace of the new building. Thus a new network design is needed according to the
layout of the building and a network design is proposed for the organization for meeting the
tender invitation.
1.2. Goals and Objectives of the Project
Performance – The UKF Trading Company network should be developed for the
measurement of the service quality and the performance of the network is measured
depending on the bandwidth, throughput, latency, error rate and jitter in the network. The
network downtime should be minimum and it should be available to the user all the time.
Backup of the network should be created for the reducing the recovery time and increasing
the performance of the network.
Availability – The network device should be connected with each other using
redundant link such that if one of the link fails the data packets can reach the destination
address using the mirror link. It also eliminates the congestion in the network and reduces the
rate of error and latency. The use of separate channel for the different departments increases
Document Page
3
ADVANCED NETWORKS
the availability of the network resources and the servers should be configured with
virtualization for balancing the loads and serve the needs of the clients.
Flexibility – Different options should be available to the user for the expansion of the
network and reduce the failure point for the development of the network framework. The
network should be tested for analysis in the errors in the configuration and the business
policy should be evaluated for the configuration of the network device. The network should
be flexible such that it can be expanded according to the growth of the organization and there
should be no performance issues for maintaining high latency.
Manageability – The network administrator is responsible for the management of the
network performance and the problems in the network should be identified for mitigation of
the risk associated with the development of the network. The throughput of the network
should be optimized for allowing the user to get the best output from the network. Different
Vlans are used for the management of the departments and divide the communication channel
for transferring of data packets. The VLAN management is important for the management of
the data traffic and enabling control on the flow of traffic in the network.
2. Logical Design
The logical diagram of the network is prepared for the AMY networks including all
the details such as the list of the network device and the IP address used for the configuration
of the interface of the device. The UKF trading servers are located in different geographical
location such as Manchester, Edinburgh and Birmingham and it is serves the needs of the
regional offices.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
ADVANCED NETWORKS
Figure 1: logical Diagram of then UKF Network
(Source: Created by author)
There is an expected growth in the current business and the current network
framework does not meets the expansion of the network. Thus the current network needs to
be modified and should be aligned with the current needs of the organization according to the
building floor plan and design the network according to the layout of the building. An
invitation of the tender is proposed by the UKF trading company for the creation of the
design of the network. The goals and objectives of the project should be analysed for the
development of the network. The network should be designed for making it flexible and
increasing the manageability of the network.
Document Page
5
ADVANCED NETWORKS
3. Associated Design Documents
IP address 2001:db8:2::/48
type
GLOBAL-UNICAST (reserved for documentation purpose
(2001:db8::/32)
[rfc3849][IANA])
network 2001:db8:2::
Prefix length 48
network range
2001:0db8:0002:0000:0000:0000:0000:0000-
2001:0db8:0002:ffff:ffff:ffff:ffff:ffff
total IP addresses 1208925819614629174706176
IP address (full) 2001:0db8:0002:0000:0000:0000:0000:0000
integer ID 42540766411285010708543214210003238912
hexadecimal ID 0x20010db8000200000000000000000000
dotted decimal ID 32.1.13.184.0.2.0.0.0.0.0.0.0.0.0.0
base 85 ID 9r}Vsq9IQv2$ZC>c}s5!
binary ID 00100000000000010000110110111000...
ip6.arpa Format 0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.0.8.b.d.0.1.0.0.2.ip6.arpa
Main Network
Document Page
6
ADVANCED NETWORKS
2001:0db8:0002:0000:0000:0000:0000:0000/48
Addressing Table
Department Subscriber Maximum
user
Network VLAN
Trading flow
employee's pcs
45 62 2001:db8::2:0/122 10
Trading flow
employee's
printers
20 30 2001:db8::2:40/123 20
Manager's pcs 15 30 2001:db8::2:60/123 30
Manager's
printers
15 30 2001:db8::2:80/123 40

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
ADVANCED NETWORKS
Part 2 – Report
Introduction
The report describes the logical design that is created for designing the framework of
the trading floor. The architecture and the protocols used for the configuration of the network
is analysed and documented for the management of the network. There are different security
measures that are used for the development of the network and prevent the external users to
access the internal components of the network.
Layer 3 architecture
For the development of the network framework the network is divided into smaller
segments that can be managed for the development of the network. The problems and the
barriers faced for the development of the network should be identified for eliminating the
errors and management of the development of the network framework. The business goals
and the technical needs is analysed and the solution is developed following the cisco SAFE
architecture for dividing the layers into the following such as:
ï‚· Core
ï‚· Access and
ï‚· Distribution layer.
Document Page
8
ADVANCED NETWORKS
Figure 1: layer 3 architecture
(Source: Created by author)
Each of the layers of the network is described in the following section of the report.
Core layer
The main elements of the core layer are the access list and the IP address used for the
configuration of the interface of the network device. It is used for transferring the data
packets from different address in the network and maintaining a consistency in the
framework of the network.
Document Page
9
ADVANCED NETWORKS
Figure 2: Core Layer
(Source: Created by author)
Access Layer
The access layer is used for the management of the permission of the users connected
in the network and handling the request of the user. The request needs to be handled
independently and each of the device connected in the network should be managed for
accessing the network framework and providing the different service required by the UKF
trading floor.
Figure 3: Access Layer
(Source: Created by author)

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10
ADVANCED NETWORKS
Document Page
11
ADVANCED NETWORKS
Distribution Layer
It is used for connecting the user with the network device and providing the access of
the core layer to the user connected in the network. It acts as an intermediate layer with the
core and the access layer for routing the data packets to the destination address in the
network.
Figure 4: Distribution Layer
(Source: Created by author)
Protocols and Devices
Protocols
There are different protocols used for the configuration of the network device and it is
used for the specification of the interaction and management of the user device and service
connected in the network.
Ethernet – It works in the physical layer of the OSI model and the Ethernet protocol
manages the communication of the data packets from the different ports of the network
device. The logical diagram states the connection between the different device and the paths
used for sending and receiving the data packets.
PPP – The point to point protocol works on the data link layer of the OSI model and
is used of the configuration of the serial interface and create a direct link with the router for
Document Page
12
ADVANCED NETWORKS
sending and receiving the data packets. It is used for encryption of the data packets and
increasing the security of the network.
IP – The internet protocol is used for the management of the identity of the hosts
connected in the network and management of the transmission of the data packets in the
network. There are different IP version such as IPv4 and IPv6 and it can be subnetted for the
management of the hosts connected in the network.
EIGRP – It is used for automating the routing protocol and management of the
routing decision and configure the router to exchange the routing information with each
other. The routing table is exchanged for the management of sending and receiving the data
packets.
TCP – The transmission control protocol is used for the establishment of the network
protocol and interconnecting the different network devices with the ISP router for exchanging
the information.
OSPF – The open shortest path first routing protocol is used for configuring the
router to find the shortest path and transmit the data packets using the path. The topology of
the network is created for the calculation of the routes and improvement of the efficiency of
the network.
Network Hardware Devices
Layer 2 Switch
Manageable switches are used for increasing the performance of the network and
improvement of the network quality and there are different network protocols that are used
for the configuration of the switches. Dynamic decision should be taken for enabling the user
for carry the data packets to the destination address. The business process of the network

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13
ADVANCED NETWORKS
should be analysed for the identification of the failure point of the UKF Trading Company.
The switch can be used for extending the network and connecting the network devices and
improvement of the cost effectiveness.
Routers
The main purpose for the deployment of the router is to connect the different floors of
the building and divide the network into different segments for the management of the
network services. It also helps in reducing the congestion in the network and have the traffic
redirecting functionality used for controlling the flow of data traffic in the network. The
incoming and the outgoing data packets in the network should be managed using different
protocols and configuring the router with firewall policy and access control list.
Network cables
The efficiency of the network is dependent on the types of network cables used for
interconnecting the network device installed in different location of the network. The cable
types is selected depending on the type of communication such as short distance or long
distance. Good quality cables are used for management of the network fundamentals and
shielded cables should be used for the removal of the electromagnetic interference that can
affect the quality of the signal and cause loss of data. The following table is created for listing
the type of cables and recording the performance of the cables.
Name of the cable Cable Type Maximum speed Distance of
Transmission
Cat 5, Cat 5e and
Cat6
UTP 100Mbps 100 meter
Cat5e and Cat6 UTP 100Mbps 100 meter
Cat5e and Cat6 UTP 10Gbps 100 meter
Document Page
14
ADVANCED NETWORKS
Single Mode fibre Fibre 10 Gbps 10 Kms
Multimode Fibre Fibre 10 gbps 300 meters
Firewall
The firewall device are used for enhancement of the security of the network and there
are different types of firewall policy that are used for the configuration of the firewall. The
firewall is used for blocking the unauthorised access of the users from accessing the secure
information of the organization. There are different inbound or outbound rules that can be
used for the management of the internal and the external traffic in the network. It can be
hardware or software used for the development of a virtual private network and manage the
flow of traffic between the trusted and the untrusted zones of the network.
Backup Solution
There are different cloud solutions that can be used as a backup for storing the
organizational data of the UKF trading company and increase the redundancy of the data. The
cloud servers would be an ideal choice for backing up the data as it can improve the
redundancy of data and make it available to the user from remote location.
Intrusion Prevention System
It is developed for the management of the IPS policy of the UKF trading company
and different set of rules are created for the prevention of the intruder to attack the network.
The flow of the network traffic can be used for the examination of the traffic flow and
identification of the exploits of the vulnerability for increasing the network security. It also
helps in improvement of the response time for any kind of emergency condition and take
Document Page
15
ADVANCED NETWORKS
immediate action according to the network management plan for mitigating the risk of
network disruption. The traffic patter should be identified for matching the type of data traffic
and detection of the anomaly in the TCP or UDP data traffic.
Intrusion detection system
It also monitors the flow of data traffic in the network and configured to generate an
alert on detection of abnormal behaviour for the usage of the network. The violation of the
network policy can be detected with the application of the intrusion detection system and the
vulnerabilities can be exploited for reposting the permission of the access of the network
device to the users connected in the network. The service and the traffic pattern should be
analysed for the configuration of the intrusion detection system and it also analyses the target
source for blocking its access and secure the network from DDoS attacks.
Port Security
The network architecture should be analysed for enforcing the port security and
disable the unused ports in the network such that it cannot be used by the attacker to intrude
into the network. The attacker can access the ports to intrude into the network and get the
details about the network device and the configuration used for creating a backdoor and
access the secure information. The network device connected with the port have a Mac
address and it is binded with the port such that other illegal devices cannot be connected.
Access control List
It is used for the configuration of the router for allowing or denying the data packets
coming from unknown sources to reach the internal network of the organization. The security
and efficiency of the network is dependent on the configuration of the router with the access
control list. It is the responsibility of the network administrator to create the access control

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
16
ADVANCED NETWORKS
list and deploy it in the interface of the router for adding extra level of security to the
network.
Protocol Filtering
It is used for filtering the data packets based on the network protocol such as ICMP,
UDP, IGMP, etc. The default security setting of the network device allows all the network
protocols and the network administrator needs to restrict the protocols depending on the
needs of the organization for management of the communication of the data packets to the
destination address.
Conclusion
The LAN is designed for the UKF trading floor after analysing the security
technologies and features that can be applied for securing the network components. For the
development of the network a prototype of the network is designed virtually that would help
to analyse the protocols and the routing protocol that should be used for the configuration of
the network. The number of routers and the switches required for providing service to the
user is also analysed for the preparation of the design of the network. The design of the
network is created for maintaining redundancy such that multiple link can be used by the user
to reach the destination address. This also helps in increasing the network uptime and
reliability of the network such that the network is available to the user all the time.
Document Page
17
ADVANCED NETWORKS
Bibliography
Beverly, R., Rohrer, J. and LaFever, B., 2016. Empirical Study of Router IPv6 Interface
Address Distributions.
CCM, (2016). Networking - 3-Tier Client/Server Architecture. [online] Available at:
http://ccm.net/contents/151-networking-3-tier-client-server-architecture [Accessed 23 Jul.
2018].
Cisco, (2016). Catalyst 6500 Release 12.2SX Software Configuration Guide - VLANs [Cisco
Catalyst 6500 Series Switches]. [online] Available at:
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/
guide/book/vlans.html [Accessed 23 Jul. 2018].
Cisco, (2016). Layer 2 and Layer 3 Switch Evolution - The Internet Protocol Journal -
Volume 1, No. 2. [online] Available at:
http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_1-2/
switch_evolution.html [Accessed 23 Jul. 2018].
Davies, J., 2012. Understanding ipv6. Pearson Education.
Gont, F. and Chown, T., 2016. Network Reconnaissance in IPv6 Networks (No. RFC 7707).
Paper, T. (2016). Enhanced Interior Gateway Routing Protocol. [online] Cisco. Available at:
http://www.cisco.com/c/en/us/support/docs/ip/enhanced-interior-gateway-routing-protocol-
eigrp/16406-eigrp-toc.html [Accessed 23 Jul. 2018].
Rohrer, J., LaFever, B. and Beverly, R., 2016. Empirical Study of Router IPv6 Interface
Address Distributions.
SearchNetworking, (2016). What is PPP (Point-to-Point Protocol)? [online] Available at:
http://searchnetworking.techtarget.com/definition/PPP [Accessed 23 Jul. 2018].
Document Page
18
ADVANCED NETWORKS
SearchNetworking, (2016). What is TCP (Transmission Control Protocol)? [online]
Available at: http://searchnetworking.techtarget.com/definition/TCP [Accessed 23 Jul. 2018].
SearchNetworking, (2016). What is Virtual LAN (VLAN)? [online] Available at:
http://searchnetworking.techtarget.com/definition/virtual-LAN [Accessed 23 Jul. 2018].
SearchSecurity, (2016). What is Firewall? [online] Available at:
http://searchsecurity.techtarget.com/definition/firewall [Accessed 23 Jul. 2018].
Techopedia.com, (2016). What is Network Redundancy? [online] Available at:
https://www.techopedia.com/definition/29305/network-redundancy [Accessed 23 Jul. 2018].
Thubert, P., Watteyne, T., Palattella, M.R., Vilajosana, X. and Wang, Q., 2013, July. Ietf
6tsch: Combining ipv6 connectivity with industrial performance. In Innovative Mobile and
Internet Services in Ubiquitous Computing (IMIS), 2013 Seventh International Conference
on (pp. 541-546). IEEE.
Verizon.com, (2016). What is a Virus Guard and Why do I need it? | High Speed Internet |
Residential Support | Verizon. [online] Available at:
https://www.verizon.com/support/residential/internet/highspeed/troubleshooting/
connection+issues/questionsone/121054.htm [Accessed 23 Jul. 2018].
Webopedia.com, (2016). What is Intrusion Detection System? [online] Webopedia. Available
at: http://www.webopedia.com/TERM/I/intrusion_detection_system.html [Accessed 23 Jul.
2018].
Webopedia.com, (2016). What is Redundant? [online] Webopedia. Available at:
http://www.webopedia.com/TERM/R/redundant.html [Accessed 23 Jul. 2018].
Webopedia.com, (2016). What is Three-Tier? [online] Webopedia. Available at:
http://www.webopedia.com/TERM/T/three_tier.html [Accessed 23 Jul. 2018].
1 out of 19
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]