Network design and analysis Assignment
VerifiedAdded on 2021/06/15
|15
|1542
|55
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
NETWORK DESIGN AND ANALYSIS.
Name:
Reg No.
Date Of Submission.
1
Name:
Reg No.
Date Of Submission.
1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Executive Summary
With advanced steps and improvement of technology mainly in networking has enhance high speed in
communication. As part of this cisco as aimed to improve the implementation and innovation of new
technologies that enhances security between the network devices. More so it is promoting learning
through release of simulation software that allows learners to configure networks and test them.The
following is the implementation of some of the features that are promoted by cisco optimization to
unlock the road of network development.
2
With advanced steps and improvement of technology mainly in networking has enhance high speed in
communication. As part of this cisco as aimed to improve the implementation and innovation of new
technologies that enhances security between the network devices. More so it is promoting learning
through release of simulation software that allows learners to configure networks and test them.The
following is the implementation of some of the features that are promoted by cisco optimization to
unlock the road of network development.
2
1 Task 1 - Setting up a Network
Network design configuring (Janitor,2010)
The figure above shows the diagram outline of the network that was set up using cisco
simulation software. The diagram composes of two routers two servers and the two pc. Each
network device within the network is identified by a unique IP address. PC-PT is given the
following identification details ip 192.168.1.2 subnet =255.255.255.0 default
gateway=192.168.1.1.The subnet identifies the ip address of the pc with bitwise AND operation
within the network. In the other hand the default gateway is the route that is used by the
computer to communicate with the other computers in another network subnet.
The routers are also used to perform traffic redirection on the network. They divide the
network into subnetworks. Each ip router is set with a different address and subnet mask id .In
router 0 the network id is ip=99.99.99.1 subnet 255.255.255.252 and that of router one the
network ids are ip=99.99.99.2 subnet 255.255.255.0.The two servers are connected to the
network switches in which they communicate .They are given specific network ids which
uniquely identifies them within the network.
The following codes were used to configure the routers.
LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0, changed state to up
3
Network design configuring (Janitor,2010)
The figure above shows the diagram outline of the network that was set up using cisco
simulation software. The diagram composes of two routers two servers and the two pc. Each
network device within the network is identified by a unique IP address. PC-PT is given the
following identification details ip 192.168.1.2 subnet =255.255.255.0 default
gateway=192.168.1.1.The subnet identifies the ip address of the pc with bitwise AND operation
within the network. In the other hand the default gateway is the route that is used by the
computer to communicate with the other computers in another network subnet.
The routers are also used to perform traffic redirection on the network. They divide the
network into subnetworks. Each ip router is set with a different address and subnet mask id .In
router 0 the network id is ip=99.99.99.1 subnet 255.255.255.252 and that of router one the
network ids are ip=99.99.99.2 subnet 255.255.255.0.The two servers are connected to the
network switches in which they communicate .They are given specific network ids which
uniquely identifies them within the network.
The following codes were used to configure the routers.
LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0, changed state to up
3
%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0, changed state to
down
%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0, changed state to
down
%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0, changed state to up
Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface Serial0/0
Router(config-if)#
Router#
%SYS-5-CONFIG_I: Configured from console by console
Router#
Router#
PINGING OF ROUTERS
3 Routing piece to self interface
4
down
%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0, changed state to
down
%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0, changed state to up
Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface Serial0/0
Router(config-if)#
Router#
%SYS-5-CONFIG_I: Configured from console by console
Router#
Router#
PINGING OF ROUTERS
3 Routing piece to self interface
4
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
When THE PC is pinged to its own network interface then it checks whether the network
components are correct or not.This also check whether the computer network software are
correct .The packets are received successfully by the PC in the network meaning that
hardware components of PC are correctly configured .
To the local router
When the pc is pinged to the local router the above results were successfully obtained. The pc
received responses from the router port as shown above. Also all the four packet were received
from the router meaning there was no loss of packets in the network during the process.
5
components are correct or not.This also check whether the computer network software are
correct .The packets are received successfully by the PC in the network meaning that
hardware components of PC are correctly configured .
To the local router
When the pc is pinged to the local router the above results were successfully obtained. The pc
received responses from the router port as shown above. Also all the four packet were received
from the router meaning there was no loss of packets in the network during the process.
5
To the local router interface
When the pc is pinged to the outward router the above results were successfully obtained. The
pc received responses from the router port as shown above. Also all the four packet were
received form the router there was no loss of packets in the network during pinging. The
received and obtained values are the same this means the packet lost equals to zero.
6
When the pc is pinged to the outward router the above results were successfully obtained. The
pc received responses from the router port as shown above. Also all the four packet were
received form the router there was no loss of packets in the network during pinging. The
received and obtained values are the same this means the packet lost equals to zero.
6
To the server
The is configured using the ip address 172.16.1.3 and 172.16.1.4,Both of them have a common
gateway 176.2.1.1.There many servers which each have different types of settings .Each server
has different types of configuration(Moss,2010).
7
The is configured using the ip address 172.16.1.3 and 172.16.1.4,Both of them have a common
gateway 176.2.1.1.There many servers which each have different types of settings .Each server
has different types of configuration(Moss,2010).
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Using Trace route from client to server
Trace route is a configuration between the server and the client. The client request information
from the server and waits for the request to be responded to.
8
Trace route is a configuration between the server and the client. The client request information
from the server and waits for the request to be responded to.
8
Task 2 - Configuring Network Services
1 Configuring DHCP on the server
PCT-PT sends a request "DHCP Discovery" message that says that it request an ip address.
(Amato,2009)The DHCP servers answers with setup offers to the pc by "DHCP Offer" unicast
message. After that DHCP customer sends a communicate "DHCP Request" message to the
system with the "Exchange ID" of the main DHCP Server that send DHCP Offer. The other
DHCP servers comprehend that DHCP customer needs to utilize the DHCP server that has the
related "Exchange ID". In conclusion the DHCP server sends a unicast "DHCP
Acknowledgment" message to the DHCP customer that says the ip task is effectively done or it
send a deny informed named "DHCP-NACK"(Index,2013).
9
1 Configuring DHCP on the server
PCT-PT sends a request "DHCP Discovery" message that says that it request an ip address.
(Amato,2009)The DHCP servers answers with setup offers to the pc by "DHCP Offer" unicast
message. After that DHCP customer sends a communicate "DHCP Request" message to the
system with the "Exchange ID" of the main DHCP Server that send DHCP Offer. The other
DHCP servers comprehend that DHCP customer needs to utilize the DHCP server that has the
related "Exchange ID". In conclusion the DHCP server sends a unicast "DHCP
Acknowledgment" message to the DHCP customer that says the ip task is effectively done or it
send a deny informed named "DHCP-NACK"(Index,2013).
9
To design a switch's dhcp, we should take after some fundamental guidance. For this design the
imperative point is communicated spaces. On the off chance that we have just a single
communicate area in our topology, at that point our work is more fundamental, else we should
get assistance from "imp-aide address" command. This order will help us to persuade the switch
and influence it to pass the communicate bundles.
2 Configuring a WEB server on dedicated machine
10
imperative point is communicated spaces. On the off chance that we have just a single
communicate area in our topology, at that point our work is more fundamental, else we should
get assistance from "imp-aide address" command. This order will help us to persuade the switch
and influence it to pass the communicate bundles.
2 Configuring a WEB server on dedicated machine
10
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
When the above request is typed on the web browser it returns the above error since it receives
no respond from the browser. This happens since no DNS name is added to server so that it can
respond to any requests (Networking, 2013).
3. Configuring a DNS Server on the server device
11
no respond from the browser. This happens since no DNS name is added to server so that it can
respond to any requests (Networking, 2013).
3. Configuring a DNS Server on the server device
11
The DNs name is added to the server by typing the domain name and the server IP address as
shown(Held,2010).Once the domain is added it appears to the server has shown above.
Some adaptive security appliance features require use of a DNS server to access external servers
by domain name; for example, the Botnet Traffic Filter feature requires a DNS server to access
the dynamic database server and to resolve entries in the static database. Other features, such as
the ping or traceroute command, let you enter a name that you want to PING for traceroute, and
the adaptive security appliance can resolve the name by communicating with a DNS server.
Many SSL VPN and certificate commands also support names (Reyzina, 2009).
12
shown(Held,2010).Once the domain is added it appears to the server has shown above.
Some adaptive security appliance features require use of a DNS server to access external servers
by domain name; for example, the Botnet Traffic Filter feature requires a DNS server to access
the dynamic database server and to resolve entries in the static database. Other features, such as
the ping or traceroute command, let you enter a name that you want to PING for traceroute, and
the adaptive security appliance can resolve the name by communicating with a DNS server.
Many SSL VPN and certificate commands also support names (Reyzina, 2009).
12
Once the DNS name is set the client can access it by typing the name that was set in the server as
shown above and the respond is received.
13
shown above and the respond is received.
13
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4. Firewall
In configuration of router filtering the following command is used to filter data from host to
server (Doherty, 2008).
Imp receive access-list 100
access-list 100 deny imp any any fragments
access-list 100 permit icmp any any echo
access-list 100 denyt tcp 192.168.1.2 any eq 22
access-list 100 permit ospf any any precedence internet
access-list 100 permit tcp host 99.99.99.2 any eq bgp precedence internet
access-list 100 deny ip any any
The above denies client 192.168.1.2 from accessing the servers.
14
In configuration of router filtering the following command is used to filter data from host to
server (Doherty, 2008).
Imp receive access-list 100
access-list 100 deny imp any any fragments
access-list 100 permit icmp any any echo
access-list 100 denyt tcp 192.168.1.2 any eq 22
access-list 100 permit ospf any any precedence internet
access-list 100 permit tcp host 99.99.99.2 any eq bgp precedence internet
access-list 100 deny ip any any
The above denies client 192.168.1.2 from accessing the servers.
14
References
Amato, V., & Lewis, W. (2009). Cisco Networking Academy Program: First-Year Companion Guide,
Revised Edition with CDROM. Cisco Press.
Doherty, J., Anderson, N., & Della Maggiora, P. L. (2008). Cisco networking simplified. Cisco Press.
Held, G., & Hundley, K. (2010). Cisco Access Lists Field Guide. McGraw-Hill Professional.
Index, C. V. N. (2013). Global mobile data traffic forecast update, 2012-2017.
Janitor, J., Jakab, F., & Kniewald, K. (2010, March). Visual learning tools for teaching/learning computer
networks: Cisco networking academy and packet tracer. In Networking and Services (ICNS),
2010 Sixth International Conference on (pp. 351-355). IEEE.
Networking, C. V. (2013). Cisco Global Cloud Index: Forecast and Methodology, 2014-2019. White
Paper), Cisco.
Prieto-Blázquez, J., Arnedo-Moreno, J., & Herrera-Joancomartí, J. (2008). An integrated structure for a
virtual networking laboratory. IEEE transactions on Industrial Electronics, 55(6), 2334-2342.
Moss, N., & Smith, A. (2010, March). Large scale delivery of cisco networking academy program by
blended distance learning. In Networking and Services (ICNS), 2010 Sixth International
Conference on (pp. 329-334). IEEE.
Revzina, J., & Grakovski, A. (2009, April). Cisco networking academy learning technologies integration
into the national academic standardised study programme. In Networking and Services,
2009. ICNS NS' 09. Fifth International Conference on(pp. 592-596). IEEE.
15
Amato, V., & Lewis, W. (2009). Cisco Networking Academy Program: First-Year Companion Guide,
Revised Edition with CDROM. Cisco Press.
Doherty, J., Anderson, N., & Della Maggiora, P. L. (2008). Cisco networking simplified. Cisco Press.
Held, G., & Hundley, K. (2010). Cisco Access Lists Field Guide. McGraw-Hill Professional.
Index, C. V. N. (2013). Global mobile data traffic forecast update, 2012-2017.
Janitor, J., Jakab, F., & Kniewald, K. (2010, March). Visual learning tools for teaching/learning computer
networks: Cisco networking academy and packet tracer. In Networking and Services (ICNS),
2010 Sixth International Conference on (pp. 351-355). IEEE.
Networking, C. V. (2013). Cisco Global Cloud Index: Forecast and Methodology, 2014-2019. White
Paper), Cisco.
Prieto-Blázquez, J., Arnedo-Moreno, J., & Herrera-Joancomartí, J. (2008). An integrated structure for a
virtual networking laboratory. IEEE transactions on Industrial Electronics, 55(6), 2334-2342.
Moss, N., & Smith, A. (2010, March). Large scale delivery of cisco networking academy program by
blended distance learning. In Networking and Services (ICNS), 2010 Sixth International
Conference on (pp. 329-334). IEEE.
Revzina, J., & Grakovski, A. (2009, April). Cisco networking academy learning technologies integration
into the national academic standardised study programme. In Networking and Services,
2009. ICNS NS' 09. Fifth International Conference on(pp. 592-596). IEEE.
15
1 out of 15
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.