logo

Network Design and Troubleshooting

   

Added on  2022-08-17

19 Pages3677 Words24 Views
Running head: COMPUTING TECHNOLOGIES
Network Design and Troubleshooting
Name of the Student
Name of the University
Author’s Note
Network Design and Troubleshooting_1
1
COMPUTING TECHNOLOGIES
Table of Contents
Introduction......................................................................................................................................2
Knowledge and Understanding........................................................................................................2
Application and Analysis.................................................................................................................4
Evaluation and Judgement...............................................................................................................7
Design and Implementation.............................................................................................................8
Testing and Documentation...........................................................................................................12
Conclusion.....................................................................................................................................14
References......................................................................................................................................16
Network Design and Troubleshooting_2
2
COMPUTING TECHNOLOGIES
Introduction
The report is created for an IT company speedfix.co.uk for designing and implementation
of a network infrastructure. The company have four departments i.e. finance/hr, engineers, sales
and admin and the number of network device needed to be installed in each of the department for
management of their operation is needed to be identified. There are four servers that are used by
the users such as WEB, Email, DNS and a File server that is needed to be accessed by each of
the department for management of their daily operation. A network diagram is created after
analyzing the departments and the devices that are needed to be installed and an appropriate
subnet plan is needed to be created such that each of the requirements are fulfilled. For assigning
the subnet different VLANs are created and the switch is needed to be configured as VTP server
and Client such that the VLAN information are distributed with the switch (Alabady, Al-
Turjman and Din 2018). The access of the subnet for each of the VLAN is needed to be managed
following the business rules of the origination. DHCP protocol is used for configuring router
device with address pool for routinely allocating IP address the host allowed access of the
specific VLAN.
Knowledge and Understanding
In the traditional network perimeter defense technique is used for protecting the data
center and the servers from vulnerable threats and enforcing little protection from this agents.
The segmentation of the network with the implementation of VLAN helps in creation of multiple
isolated network and each of the network have broadcast domain separated. With the proper
configuration of the network the VLAN can create a barrier for the attacker to access the system
surface (Sasaki, Yokotani and Mukai 2018). The packet sniffing capabilities can also be reduced
Network Design and Troubleshooting_3
3
COMPUTING TECHNOLOGIES
and thus the agents needs to put more effort for gathering information for accessing the system
components. Thus, the implementation of the VLAN increases the security, flexibility and the
mobility of the user and helps in development of an efficient network for speedfix.co.uk. The
users of the network can be assigned with a specific VLAN would be always connected to that
VLAN irrespective of the location (Owada et al. 2019). The use of the VLAN concept also helps
in creating an efficient design for the wireless network and eliminates the security constraints.
The switches that are used in the network operates on IEEE 802.1D standard at the
second layer (data link) of the OSI model. The OSI model is used as the guideline for the
manufacturers to build the interface along with other network technology. Address resolution
protocol is needed for enabling communication with the network device that is attached. An IP
address is needed to be assigned to each of the network device with a network identifier for
broadcasting the packets and getting response from the targeted device with the destination IP
address (Fujikawa et al. 2017). The switch receives the broadcast message and broadcasts to the
port expect from the port where it has received the message. The delivery of the pack can
become an issue since the broadcast of the message generates unnecessary network traffic and
causes a degradation in the network performance. An issue is also faced in the network visibility
because it cannot identify the authorization of a requesting device for establishing connection
with the targeted device. If the device exists in the network with the targeted IP address, it picks
the broadcast message and processes the message (Wong and Wan 2017). Using the MAC
address of the source present in the broadcast message a response is sent to requesting device
including the MAC address of the target.
For reducing the network traffic 802.1Q compatible switches are needed to be used since
it has the ability of segmenting the network into broadcast domains. The VLAN is needed to be
Network Design and Troubleshooting_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Design for Top Network Company
|11
|1135
|334

NETWORK DESIGNING AND TROUBLESHOOT
|24
|3869
|12

Network Design And Troubleshooting docx.
|21
|3941
|11

Case Study of on Network Designing and Troubleshooting | Report
|17
|3617
|17

Overview of Internetworking for Primary School Network Solution
|9
|1422
|474

Network Design Report for ICT106 Data Communications and Networks
|10
|1566
|337