1NETWORK DESIGN AND TROUBLESHOOTING Table of Contents Introduction:....................................................................................................................................2 Understanding of the Network Model:............................................................................................3 Analysis of the Network:.................................................................................................................5 Router:.........................................................................................................................................5 Switches:......................................................................................................................................6 Wireless Access Points:...............................................................................................................6 Computer Systems:......................................................................................................................6 Implementation of the Network:......................................................................................................7 Network Diagram:.......................................................................................................................7 DHCP Service:.............................................................................................................................8 VLAN:.........................................................................................................................................8 Trunking:.....................................................................................................................................9 Access Control:............................................................................................................................9 Testing and Documentation:............................................................................................................9 Conclusion:....................................................................................................................................16 References:....................................................................................................................................18
2NETWORK DESIGN AND TROUBLESHOOTING Introduction: Speedfix.co.uk is a small organization that is currently looking to implement a network infrastructureforitsorganizationalpurposes.Thisorganizationisstructuredintofour departments, which are the Finance/HR department, Sales department, Engineers department, and Admins department. There are a total of four servers in the organization which are important for performing daily operations of the organization. These four servers are the email server, web server, DNS server, and common file server. These servers are shared across all the users, where the users are free to access them. There is an important requirement for this network system, which is that each department must not have any access to other departments. Each department will only be able to access the servers of the organization. In the finance department, there are 10 computers and a printer. The sales department have 37 computer and printer. Engineers department have 19 computer and printer. The admin department does have 4 computers and a printer. Apart from these individual departments, there are wireless access points present, which are also able to access any of the servers, but the wireless access points will be unable to access any of the individual departments of the organization. In this network, some IoT devices will alsobeincludedformonitoringthetemperatureandtheserverroomdoor.Currently, Speedfix.co.uk is intended to use its private network IP address, which is 192.168.168.0/24, and that will be used for wired communication. For the wireless connection, the organization is intended to use the 10.10.10.0/24 network. For the configuration of this network, some important concepts from networking have been used, including the VLAN and access control list (Caoet al.2020). These concepts have been used for preparing the overall network design as per the requirements. Also, the DHCP
3NETWORK DESIGN AND TROUBLESHOOTING protocol has been used in this network configuration so that all the IP addresses can be assigned dynamically. Also, some IoT devices have been included in the network configuration. Understanding of the Network Model: In the current network model, there are a total of four departments, which are the Finance/HR department, Sales department, Admin department, and the Engineer department. These four departments are the main operations department of Speedfix.co.uk, and for this reason, it has been involved in the overall network design. The finance/HR department has ten computers. The Sales department has 37 computer systems, 19 computers in the Engineering department and four computers in the Admin department. To provide important functionality to these computer systems, there are four important servers, which are the DNS server, Email server,Webserver,andtheFileServer.Eachoftheserversareimportantforoverall functionality of the organization. As per the network requirement of the organization, each of the four departments is able to access all the servers individually (Tagliacaneet al.2016). Here, all the computer systems present in each of the departments of the Speedfix.co.uk are able to communicate with the servers, but inter-department communication is prohibited in this network design, which is an important business criterion for Speedfix.co.uk. Thus, according to the business criteria of the organization, the proper network needs to be developed. In this context, before the development of the actual network, it is important to check the feasibility of the project. Budget is one of the important criteria for testing the feasibility of a project or a system (Mesly 2017), but it has been excluded here from the feasibility testing. The main criteria of the testing are whether the current network architecture can be implemented in the organization or not. Thus, a simulation needs to be performed of the actual system so that it can be ensured that the actual system will be working fine in the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4NETWORK DESIGN AND TROUBLESHOOTING organization (Rosewellet al.2018). In this context, simulation has been performed using the Cisco Packet Tracer software. Here, a rough implementation of the actual system has been done within the logical surface of the software (Muniasamy, Ejlani and Anadhavalli 2019), and following that, each of the network components have been configured accordingly so that proper connection can be established among the networking components. For developing the actual network of the organization, proper network topology needs to be developed. The network topology is considered as the arrangement of elements within a communication network (Segarraet al.2017). The network topology is mainly used for describing the arrangements of various telecommunication networks. This telecommunication network can include control and command radio networks, computer networks, and industrial field-busses network. The current network topology is a computer network. There are several network topologies that can be used for designing a network. These topologies are the star topology, bus topology, ring topology, hybrid topology, mesh topology, and the tree topology (Nedić, Olshevsky, and Rabbat 2018). A specific type of topology is important for designing some specific types of network systems. There are several important concepts that are associated with the designing of the present network. Ethernet is crucial component that play an important role in designing this network system(Ishak,LeongandSirajudin2019).Ethernetisanimportantprotocolforthe configuration of the local area network. Ethernet cables are used for creating a LAN, which has also been used in the current design of the network. Next, IP addressing and sub-netting is another important area. To function in a network, each of the computer systems must have a unique Layer 3 address, which is the IP address (Almohri, Watson and Evans 2019). An IP address consists of a total of four numbers that are separated by the dots. In several cases, the IP
5NETWORK DESIGN AND TROUBLESHOOTING address is divided into smaller blocks, and this process is known as the IP sub-netting. Both of the IP addressing and the sub-netting has been used for configuring the current network. The default gateway is another important aspect used for network designing purposes. The default gateway is used for communication among two computer devices (Lemeshko, Yeremenko and Tariki 2017). The default gateway does not exist in the local area network. The default gateway presents in the local router of the network topology. The default gateway network is not essential, but it is important to establish a connection with another network. These are the main area regarding networking that has been used for developing this network. Analysis of the Network: For the development of this network for Speedfix.co.uk different type of network component has been used. These networking devices include routers, switches, wireless access points, printers, smartphones, and personal computer systems. For establishing connections between the devices, two types of cables have been used. These cables are the copper straight- throughwireandcoppercross-overwire.Thecopperstraight-throughwireisusedfor connecting different types of devices where the copper cross-over wire is used for establishing connection similar types of devices. In the following section, an important component that has been used is discussed. Router: The router is one of the important network components used in the networking purpose. The router is an important component that is used for routing the traffic between different subnets. A router functions in layer 3 of the OSI model (List 2020). In a common situation, a router is mainly used for routing the traffic from LAN connection to a WAN connection. In large organizations, the router is used for routing the traffic between various IP subnets within a big
6NETWORK DESIGN AND TROUBLESHOOTING LAN. For the network of Speedfix.co.uk router has been used for routing the traffic among the IP subnets. Switches: Switches are another important network component that has been used for designing the current network infrastructure for Speedfix.co.uk. The switches executes on OSI model’s layer 2, and it is used for connecting all the devices on the LAN (Kwonet al.2017). The switches are capable of switching the frames depending on the endpoint MAC address for a specific frame. Switches are available in a variety of sizes, and the users are free to choose depending on their requirements. In the current network, industry level switches have been used for developing the connection. Wireless Access Points: Thewirelessaccesspointshavealsobeenimplementedwithinthisnetwork.In networking, a wireless access point is a common type of hardware that is mainly used for allowing the Wi-Fi devices to be connected with a wired network. A common wireless access point can be a standalone device that will be connected with the router (Liet al.2019). In the current network, wireless access points have been used for connecting the wireless mobile deviceswith the network of Speedfix.co.uk.This wirelessaccesspoint will provide the connectivity to the mobile devices so that they can access the important files from the organization. Computer Systems: Computer systems have also been used for the network designing purpose within the network of Speedfix.co.uk. The computer systems have been mainly used for performing
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7NETWORK DESIGN AND TROUBLESHOOTING organizational operations and for communication purposes with other devices. The computer system will be used for accessing important information from the servers. Also, the computer systems will be used for accessing information from a different computer system within the same department. Implementation of the Network: Network Diagram: The network diagram has been developed for Speedfix.co.uk using the Cisco Packet Tracer Software, and the simulation of the developed network has also been done. In the following section, the developed network diagram is presented. (Figure 1: Network Diagram for Speedfix.co.uk) (Source: Created by the Author) In the above section, the developed network diagram for the Speedfix.co.uk can be seen. In this whole network diagram, a single router has been used for routing the network traffic to different devices. In this network, there is a main switch, which is providing the connection to all other devices functioning within the network. From the main switch, the network has been
8NETWORK DESIGN AND TROUBLESHOOTING subdivided into a total of six parts. The first sub-switch is connected with the servers of the organization. The second sub-switch is for the Finance/HR department. The third sub-switch is for the Sales department. The fourth sub-switch is connected to the Engineer department. The fifth sub-switch is connected with the Admin department, and the last sub-switch is used for the wireless access points to provide connectivity to the wireless devices. For connecting each of the switches to the router, the subnet interface has been used. Here, a total of six subnets has been created in the router for connecting each of the sub-switch through the main switch. These subnets have been created in the FastEthernet Port 0/0 of the main router. All the servers are connected to the router through the subnet network 192.168.168.0. Similarly, the Finance/HR department is connected to the subnet network 192.168.2.0. The other departments, which are the Sales department, Engineer department, Admin department, and the wireless access point, are connected to subnet network 192.168.3.0, 192.168.4.0, 192.168.5.0 and 10.10.10.0 respectively. The IoT devices are connected with the router through the FastEthernet port, and an intermediate switch has also been used for the connection purpose where the used IP is 192.168.100.1. DHCP Service: The DHCP service has been configured in the router for automatic assigning of the IP addresses to all the networking devices dynamically. The DHCP is important in this network as it establishesthecommunicationbetweenthedevicesamongthenetworks(Yaibuates, Chaisricharoen and Rai 2018). VLAN: VLANs have also been used in this network configuration for differentiating each of the departments in the organization. A VLAN or the virtual LAN is any domain of broadcast that is isolated and partitioned within a computer network at the data link layer (Nguyen and Kim
9NETWORK DESIGN AND TROUBLESHOOTING 2016). By using the VLAN in this network, logical groups of devices have been created within the same broadcasting domain. VLANs are configured through the switches. In this network, each of the departments has been configured through a VLAN for creating a separate logical network in the main network. VLANs are important for this network so that inter-department communication can be restricted, which is one of the important requirements of Speedfix.co.uk. Trunking: Trunking has also been used using the switch for this network. The trunking is the method for providing network access to various clients. The trunking is achieved by sharing a set of frequencies instead of providing the frequencies in a sequential way (Dong and Gong 2019). Regarding the trunking process, VTP or the VLAN Trunking Protocol has been used for this network. In the VTP configuration, VTP carries the information of VLAN to all the switches within a VTP domain. Access Control: Also, the configuration of this network includes access control. The network access control is an approach used in computer security for implementing an authentication limitation (Touraniet al.2017). The access control list has been used in this network for restricting the communication between all the four departments of the Speedfix.co.uk. The access control list ensures that all the departments will only be able to access the servers of the organization. Testing and Documentation: Speedfix.co.uk has implemented this network so that each of the four departments of the organization can communicate with the servers of the organization so that important documents can be accessed. Though all the departments are communicating with server, each of the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10NETWORK DESIGN AND TROUBLESHOOTING departments is isolated from each other, which is the network requirement of Speedfix.co.uk. Also, the wireless network is only able to access the servers and will not be able to access any department of the organization. In the following section, testing of the network is demonstrated. In the above screenshot, it can be seen that the ping test has been done using the PC1 of the finance department on the Web server and the Email server, which are having the IP address 192.168.168.11 and 192.168.168.13 respectively. In both of the cases, ping was successful, which means the connection has been established within them.
11NETWORK DESIGN AND TROUBLESHOOTING The above screenshot has been taken with the PC1 of the sales department where ping testing has been done on the DNS server, and the common file server, and in both the cases, the tests are positive.
12NETWORK DESIGN AND TROUBLESHOOTING Again, ping testing has been done here using the PC1 of the Engineering department, and in this test, ping testing is done on the IP address of 192.168.168.11 and 192.168.168.12, which are the IP address of Web server, and the DNS server and in this testing both are responsive.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
13NETWORK DESIGN AND TROUBLESHOOTING Also, pinging has been done using the PC1 of the Admin department, and here Email server and the common file server has been pinged. In this case, also the ping tests were positive, and it means the server is accessible from the admin department.
14NETWORK DESIGN AND TROUBLESHOOTING Ping testing has also been done using the end-user smartphone devices, which are connected to the wireless access points of the organization. In this case, ping testing is also successful, which means that servers are also accessible from the wireless access points.
15NETWORK DESIGN AND TROUBLESHOOTING The above screenshot has been taken using the PC1 of the Finance department, where the PC37 of the Sales department has been pinged first, but the ping result was negative, which justifies that there is no connection among different departments. In the second section, the PC10 of the Finance department has been pinged, and the result was positive. It means the connection is present between the devices within the same department.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
16NETWORK DESIGN AND TROUBLESHOOTING Again, ping testing has been done from the Smartphone1, and both of the PCs of the Finance department and Engineer department have been pinged, and in both of the cases, results were negative, which justified that wireless access points have no access to each of the department of the organization. Conclusion: In the above discussion, a specificnetwork configuration has been prepared for the Speedfix.co.uk organization using the Cisco Packet Tracer simulation. In the current context, the
17NETWORK DESIGN AND TROUBLESHOOTING networkrequirementoftheSpeedfix.co.ukdefinesthatallthefourdepartmentsofthe organization can access the four servers of the organization, but there will be no connection from one department to another department. In this report, a network has been demonstrated by following these criteria. First, in this report, a brief understanding of the implemented network model has been provided.In the following section of this report analysis of the important networking, components have been done which have been used for creating the overall network. The next section of this report comprises the network implementation where the network diagram has been demonstrated, and important concepts used for designing the network has been demonstrated. In the further section of this report, testing and documentation have been provided for the current simulated system.
18NETWORK DESIGN AND TROUBLESHOOTING References: Almohri, H.M., Watson, L.T. and Evans, D., 2019. Predictability of IP address allocations for cloud computing platforms.IEEE Transactions on Information Forensics and Security,15, pp.500-511. Cao, Y., Li, Y., Liu, X. and Rehtanz, C., 2020. Modeling and Simulation of Data Flow for VLAN-BasedSubstationCommunicationSystem.InCyber-PhysicalEnergyandPower Systems(pp. 75-101). Springer, Singapore. Dong, J. and Gong, W., 2019, October. A Load Balancing Algorithm for Media Server in Distributed Trunking Communication System. In2019 IEEE 19th International Conference on Communication Technology (ICCT)(pp. 926-930). IEEE. Ishak, M.K., Leong, C.C. and Sirajudin, E.A., 2019. Embedded Ethernet and Controller Area Network(CAN)inRealTimeControlCommunicationSystem.In10thInternational Conference on Robotics, Vision, Signal Processing and Power Applications(pp. 133-139). Springer, Singapore. Kwon, J.S., Everetts, N.J., Wang, X., Wang, W., Della Croce, K., Xing, J. and Yao, G., 2017. Controlling depth of cellular quiescence by an Rb-E2F network switch.Cell reports,20(13), pp.3223-3235. Lemeshko, O., Yeremenko, O. and Tariki, N., 2017. Solution for the default gateway protection within fault-tolerant routing in an IP network.International journal of electrical and computer engineering systems,8(1.), pp.19-26.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
19NETWORK DESIGN AND TROUBLESHOOTING Li, Y., Yan, K., He, Z., Li, Y., Gao, Z., Pei, L., Chen, R. and El-Sheimy, N., 2019. Cost- Effective Localization Using RSS from Single Wireless Access Point.IEEE Transactions on Instrumentation and Measurement. List, R.L., 2020. Verizon Router Login: Learn to Configure your Router Settings. Mesly, O., 2017.Project feasibility: Tools for uncovering points of vulnerability. CRC Press. Muniasamy, V., Ejlani, I.M. and Anadhavalli, M., 2019. Student’s Performance Assessment and Learning Skill towards Wireless Network Simulation Tool–Cisco Packet Tracer.International Journal of Emerging Technologies in Learning (iJET),14(07), pp.196-208. Nedić, A., Olshevsky, A. and Rabbat, M.G., 2018. Network topology and communication- computation tradeoffs in decentralized optimization.Proceedings of the IEEE,106(5), pp.953- 976. Nguyen, V.G. and Kim, Y.H., 2016. SDN-Based Enterprise and Campus Networks: A Case of VLAN Management.Journal of Information Processing Systems,12(3). Rosewell, J., Kear, K., Jones, A., Smith, A., Donelan, H., Mikroyannidis, A., Peasgood, A., Sanders, C., Third, A., Wermelinger, M. and Moss, N., 2018. Open Networking Lab: online practical learning of computer networking. Segarra, S., Marques, A.G., Mateos, G. and Ribeiro, A., 2017. Network topology inference from spectraltemplates.IEEETransactionsonSignalandInformationProcessingover Networks,3(3), pp.467-483. Tagliacane, S.V., Prasad, P.W.C., Zajko, G., Elchouemi, A. and Singh, A.K., 2016, March. Network simulations and future technologies in teaching networking courses: Development of a
20NETWORK DESIGN AND TROUBLESHOOTING laboratorymodelwithCiscoVirtualInternetRoutingLab(Virl).In2016International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)(pp. 644-649). IEEE. Tourani, R., Misra, S., Mick, T. and Panwar, G., 2017. Security, privacy, and access control in information-centric networking: A survey.IEEE communications surveys & tutorials,20(1), pp.566-600. Yaibuates, M., Chaisricharoen, R. and Rai, C., 2018. Implementing of IP address Recovery for DHCP Service.International Journal of Applied Engineering Research,13(5), pp.2659-2662.