Network Routing and Access Restrictions Tasks 2022
VerifiedAdded on 2022/10/11
|16
|1836
|7
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: NETWORK ROUTING AND ACCESS RESTRICTIONS
Network Routing and Access Restrictions
Name of the Student
Name of the University
Author Note
Network Routing and Access Restrictions
Name of the Student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1
NETWORK ROUTING AND ACCESS RESTRICTIONS
Task 1: What types of routers are needed and how many of them are
required according to given specification.
It is the generic routers available in Cisco Packet Tracer which are taken to setup the
LAN networks for each of the following cities – Sydney, Singapore, Berlin, London,
Sacramento, Tokyo and Bombay.
Task 2: How many switches are needed for this complete project and what
type of switches will be suitable for each LAN.
Only one multilayer switch is required for all the LAN networks. However, the access layer
switches will vary in number among every network.
Since the Sydney network requires 450 nodes, number of layer 2 switches required for this
network is 450/24 = 18.75 or 19 layer 2 switches.
Since the Singapore network requires 190 nodes, number of layer 2 switches required for this
network is 190/24 = 7.916 or 8 layer 2 switches.
Since the Berlin network requires 55 nodes, number of layer 2 switches required for this
network is 55/24 = 2.29 or 3 layer 2 switches.
Since the London network requires 495 nodes, number of layer 2 switches required for this
network is 495/24 = 20.625 or 21 layer 2 switches.
Since the Sacramento network requires 77 nodes, number of layer 2 switches required for this
network is 77/24 = 3.2 or 4 layer 2 switches.
Since the Singapore network requires 95 nodes, number of layer 2 switches required for this
network is 95/24 = 3.958 or 4 layer 2 switches.
NETWORK ROUTING AND ACCESS RESTRICTIONS
Task 1: What types of routers are needed and how many of them are
required according to given specification.
It is the generic routers available in Cisco Packet Tracer which are taken to setup the
LAN networks for each of the following cities – Sydney, Singapore, Berlin, London,
Sacramento, Tokyo and Bombay.
Task 2: How many switches are needed for this complete project and what
type of switches will be suitable for each LAN.
Only one multilayer switch is required for all the LAN networks. However, the access layer
switches will vary in number among every network.
Since the Sydney network requires 450 nodes, number of layer 2 switches required for this
network is 450/24 = 18.75 or 19 layer 2 switches.
Since the Singapore network requires 190 nodes, number of layer 2 switches required for this
network is 190/24 = 7.916 or 8 layer 2 switches.
Since the Berlin network requires 55 nodes, number of layer 2 switches required for this
network is 55/24 = 2.29 or 3 layer 2 switches.
Since the London network requires 495 nodes, number of layer 2 switches required for this
network is 495/24 = 20.625 or 21 layer 2 switches.
Since the Sacramento network requires 77 nodes, number of layer 2 switches required for this
network is 77/24 = 3.2 or 4 layer 2 switches.
Since the Singapore network requires 95 nodes, number of layer 2 switches required for this
network is 95/24 = 3.958 or 4 layer 2 switches.
2
NETWORK ROUTING AND ACCESS RESTRICTIONS
Since the Bombay network requires 27 nodes, number of layer 2 switches required for this
network is 2.
The network requires two kinds of switches for every LAN configuration i) a multilayer
switch and ii) layer 2 switch.
Task 3: Establish the sitting and types of terminals, processors and
required protocols and architecture based on technical specification and
requirements.
The cables used by the routers of every LAN configuration for connecting the
multilayer switch as also by layer 2 switches for connecting individual devices are straight
through cables. Cable used by the multilayer switch for connecting the layer 2 switches are
cross over cables. Cables used by routers of one LAN network to connect router of another
LAN network are serial cables.
The processors required for the workstations and servers involved in the network are
Intel core or AMD ryzen series of CPUs for the workstations and Intel xeon or AMD opteron
for the servers.
NETWORK ROUTING AND ACCESS RESTRICTIONS
Since the Bombay network requires 27 nodes, number of layer 2 switches required for this
network is 2.
The network requires two kinds of switches for every LAN configuration i) a multilayer
switch and ii) layer 2 switch.
Task 3: Establish the sitting and types of terminals, processors and
required protocols and architecture based on technical specification and
requirements.
The cables used by the routers of every LAN configuration for connecting the
multilayer switch as also by layer 2 switches for connecting individual devices are straight
through cables. Cable used by the multilayer switch for connecting the layer 2 switches are
cross over cables. Cables used by routers of one LAN network to connect router of another
LAN network are serial cables.
The processors required for the workstations and servers involved in the network are
Intel core or AMD ryzen series of CPUs for the workstations and Intel xeon or AMD opteron
for the servers.
3
NETWORK ROUTING AND ACCESS RESTRICTIONS
Task 4: Set up the layout of the complete network in simulated
environment using Router SIM network visualizer application software.
The network design is built using Cisco Packet Tracer 6.2. The network design
includes configuration of seven LAN networks and the entire WAN network. Routing
between the different routers is ensured by RIP routing protocol. DHCP of the LAN networks
is configured in the respective routers.
Task 5: Provide details of complete network LAN and WAN diagrams. You
need to provide full details of logical and physical topology you going to
use, how you going to connect 7 different LAN across different nations,
what transmission media would you will and so on.
The complete WAN diagram includes the 7 LAN networks where one workstation
along with the mail server is shown. These 7 LAN networks form the complete WAN
network by connecting the routers of each LAN network through the serial cables. To
implement this WAN network, the two routers of the different LAN networks have IP
address assigned to the serial interfaces while sharing the same subnet network. The different
LAN networks assign different set of IP addresses to their individual devices using different
subnet networks.
NETWORK ROUTING AND ACCESS RESTRICTIONS
Task 4: Set up the layout of the complete network in simulated
environment using Router SIM network visualizer application software.
The network design is built using Cisco Packet Tracer 6.2. The network design
includes configuration of seven LAN networks and the entire WAN network. Routing
between the different routers is ensured by RIP routing protocol. DHCP of the LAN networks
is configured in the respective routers.
Task 5: Provide details of complete network LAN and WAN diagrams. You
need to provide full details of logical and physical topology you going to
use, how you going to connect 7 different LAN across different nations,
what transmission media would you will and so on.
The complete WAN diagram includes the 7 LAN networks where one workstation
along with the mail server is shown. These 7 LAN networks form the complete WAN
network by connecting the routers of each LAN network through the serial cables. To
implement this WAN network, the two routers of the different LAN networks have IP
address assigned to the serial interfaces while sharing the same subnet network. The different
LAN networks assign different set of IP addresses to their individual devices using different
subnet networks.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4
NETWORK ROUTING AND ACCESS RESTRICTIONS
Task 6: Design and calculate IP address scopes for seven global DHCP
servers as part of a project to deploy your organisation’s International
email system
Subnet
Name
Need
ed
Size
Alloca
ted
Size
Address
Ma
sk
Dec Mask
Assignab
le Range
Broadcas
t
Sydney 450 510
192.168.2.
0
/23
255.255.25
4.0
192.168.2.
1 -
192.168.3.
254
192.168.3.
255
Singapo
re
190 254
192.168.4.
0
/24
255.255.25
5.0
192.168.4.
1 -
192.168.4.
254
192.168.4.
255
Berlin 55 62
192.168.6.
0
/26
255.255.25
5.192
192.168.6.
1 -
192.168.6.
62
192.168.6.
63
London 495 510
192.168.8.
0
/23
255.255.25
4.0
192.168.8.
1 -
192.168.9.
254
192.168.9.
255
NETWORK ROUTING AND ACCESS RESTRICTIONS
Task 6: Design and calculate IP address scopes for seven global DHCP
servers as part of a project to deploy your organisation’s International
email system
Subnet
Name
Need
ed
Size
Alloca
ted
Size
Address
Ma
sk
Dec Mask
Assignab
le Range
Broadcas
t
Sydney 450 510
192.168.2.
0
/23
255.255.25
4.0
192.168.2.
1 -
192.168.3.
254
192.168.3.
255
Singapo
re
190 254
192.168.4.
0
/24
255.255.25
5.0
192.168.4.
1 -
192.168.4.
254
192.168.4.
255
Berlin 55 62
192.168.6.
0
/26
255.255.25
5.192
192.168.6.
1 -
192.168.6.
62
192.168.6.
63
London 495 510
192.168.8.
0
/23
255.255.25
4.0
192.168.8.
1 -
192.168.9.
254
192.168.9.
255
5
NETWORK ROUTING AND ACCESS RESTRICTIONS
Sacram
ento
77 126
192.168.1
0.128
/25
255.255.25
5.128
192.168.1
0.129 -
192.168.1
0.254
192.168.1
0.255
Tokyo 95 126
192.168.1
2.0
/25
255.255.25
5.128
192.168.1
2.1 -
192.168.1
2.126
192.168.1
2.127
Bombay 27 30
192.168.1
4.64
/27
255.255.25
5.224
192.168.1
4.65 -
192.168.1
4.94
192.168.1
4.95
The above IP table lists the subnets required by the seven different LAN
configurations to meet the requirements regarding connecting the required number of nodes
as specified.
Task 7: Shut down all unused port from all switches
NETWORK ROUTING AND ACCESS RESTRICTIONS
Sacram
ento
77 126
192.168.1
0.128
/25
255.255.25
5.128
192.168.1
0.129 -
192.168.1
0.254
192.168.1
0.255
Tokyo 95 126
192.168.1
2.0
/25
255.255.25
5.128
192.168.1
2.1 -
192.168.1
2.126
192.168.1
2.127
Bombay 27 30
192.168.1
4.64
/27
255.255.25
5.224
192.168.1
4.65 -
192.168.1
4.94
192.168.1
4.95
The above IP table lists the subnets required by the seven different LAN
configurations to meet the requirements regarding connecting the required number of nodes
as specified.
Task 7: Shut down all unused port from all switches
6
NETWORK ROUTING AND ACCESS RESTRICTIONS
The above diagram shows that all the ports and interfaces of each of the switches
apart from the ones being used are administratively shut down.
Task 8: Implement the Access Control list in such a way that Sydney local
area Network can’t ping Bombay Local Network but Bombay Local area
network can ping Sydney Local area network.
The following screenshots show the codes used to implement the access restrictions using
ACL extended commands.
The next screenshot shows implementation of the ACL group thus created in the right
interface.
NETWORK ROUTING AND ACCESS RESTRICTIONS
The above diagram shows that all the ports and interfaces of each of the switches
apart from the ones being used are administratively shut down.
Task 8: Implement the Access Control list in such a way that Sydney local
area Network can’t ping Bombay Local Network but Bombay Local area
network can ping Sydney Local area network.
The following screenshots show the codes used to implement the access restrictions using
ACL extended commands.
The next screenshot shows implementation of the ACL group thus created in the right
interface.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7
NETWORK ROUTING AND ACCESS RESTRICTIONS
The above diagram shows that the access control list commands are used and
implemented in the respective interfaces.
The ICMP packet tests validate that access restrictions put in place by means of
access control list extended commands.
NETWORK ROUTING AND ACCESS RESTRICTIONS
The above diagram shows that the access control list commands are used and
implemented in the respective interfaces.
The ICMP packet tests validate that access restrictions put in place by means of
access control list extended commands.
8
NETWORK ROUTING AND ACCESS RESTRICTIONS
Task 9: Configure secure shell (SSH) on routers to enable secure
management
The following screenshot show how the ssh cryptographic shell security is implemented in
routers
The below screenshot shows that upon entering the correct, one is able to enter the router
terminal.
NETWORK ROUTING AND ACCESS RESTRICTIONS
Task 9: Configure secure shell (SSH) on routers to enable secure
management
The following screenshot show how the ssh cryptographic shell security is implemented in
routers
The below screenshot shows that upon entering the correct, one is able to enter the router
terminal.
9
NETWORK ROUTING AND ACCESS RESTRICTIONS
Task 10: Design and calculate IP address for serial and Ethernet interfaces
for each routers
Sub
net
Nam
e
Need
ed
Size
Alloca
ted
Size
Address
Ma
sk
Dec Mask
Assignabl
e Range
Broadcast
SY-
SG
2 2 192.168.1
5.116
/30 255.255.25
5.252
192.168.1
5.117 -
192.168.1
192.168.1
5.119
NETWORK ROUTING AND ACCESS RESTRICTIONS
Task 10: Design and calculate IP address for serial and Ethernet interfaces
for each routers
Sub
net
Nam
e
Need
ed
Size
Alloca
ted
Size
Address
Ma
sk
Dec Mask
Assignabl
e Range
Broadcast
SY-
SG
2 2 192.168.1
5.116
/30 255.255.25
5.252
192.168.1
5.117 -
192.168.1
192.168.1
5.119
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10
NETWORK ROUTING AND ACCESS RESTRICTIONS
5.118
SG-
BR
2 2
192.168.1
5.112
/30
255.255.25
5.252
192.168.1
5.113 -
192.168.1
5.114
192.168.1
5.115
BR-
LD
2 2
192.168.1
5.100
/30
255.255.25
5.252
192.168.1
5.101 -
192.168.1
5.102
192.168.1
5.103
LD-
SC
2 2
192.168.1
5.104
/30
255.255.25
5.252
192.168.1
5.105 -
192.168.1
5.106
192.168.1
5.107
SC-
TK
2 2
192.168.1
5.108
/30
255.255.25
5.252
192.168.1
5.109 -
192.168.1
5.110
192.168.1
5.111
TK-
BB
2 2
192.168.1
5.120
/30
255.255.25
5.252
192.168.1
5.121 -
192.168.1
5.122
192.168.1
5.123
The above IP table shows the subnet networks used by the routers of different LAN networks
to connect with one another over the WLAN using serial cable. Here two routers connected to
each other share the same subnet.
NETWORK ROUTING AND ACCESS RESTRICTIONS
5.118
SG-
BR
2 2
192.168.1
5.112
/30
255.255.25
5.252
192.168.1
5.113 -
192.168.1
5.114
192.168.1
5.115
BR-
LD
2 2
192.168.1
5.100
/30
255.255.25
5.252
192.168.1
5.101 -
192.168.1
5.102
192.168.1
5.103
LD-
SC
2 2
192.168.1
5.104
/30
255.255.25
5.252
192.168.1
5.105 -
192.168.1
5.106
192.168.1
5.107
SC-
TK
2 2
192.168.1
5.108
/30
255.255.25
5.252
192.168.1
5.109 -
192.168.1
5.110
192.168.1
5.111
TK-
BB
2 2
192.168.1
5.120
/30
255.255.25
5.252
192.168.1
5.121 -
192.168.1
5.122
192.168.1
5.123
The above IP table shows the subnet networks used by the routers of different LAN networks
to connect with one another over the WLAN using serial cable. Here two routers connected to
each other share the same subnet.
11
NETWORK ROUTING AND ACCESS RESTRICTIONS
Task 11: Backup all configuration files in secure place/ FTP Server.
The above screenshot shows that all of the network configuration has been saved in
the FTP server under the username ftp.
Task 12: Determine support and training requirement after
implementation.
Obtaining support for the network is not a big issue as long as the vendor chosen for
the network equipment happens to be a trusted well-known as well as among the leading
makers of network components like Cisco. Companies like Cisco offer quality support
services along with replacement of parts and warranty services. For training the network
NETWORK ROUTING AND ACCESS RESTRICTIONS
Task 11: Backup all configuration files in secure place/ FTP Server.
The above screenshot shows that all of the network configuration has been saved in
the FTP server under the username ftp.
Task 12: Determine support and training requirement after
implementation.
Obtaining support for the network is not a big issue as long as the vendor chosen for
the network equipment happens to be a trusted well-known as well as among the leading
makers of network components like Cisco. Companies like Cisco offer quality support
services along with replacement of parts and warranty services. For training the network
12
NETWORK ROUTING AND ACCESS RESTRICTIONS
users, the network administrators must acquire knowledge transition from the engineers of
Cisco or other reputed vendors.
Task 13: Obtain latest technical specification and pricing by contacting
possible vendors.
Cisco is shortlisted as the vendor for the network equipment. The technical
specifications for these network equipment are:
Generic routers of Cisco C2514 or above versions
Specifications:
Ports : Two (2) DB-15 AUI 10BASE-T ethernet ports
Uplink Ports : Two (2) DB-60 serial port
Management ports : One (1) RJ-45 serial console and One (1) RJ-45 AUX
DRAM : 16MB
Management protocols : SNMP
Cost $1950
Cisco 2960 or similar switches
Specification:
Subtype. Fast Ethernet.
Ports. 24 x 10/100 + 2 x 10/100/1000.
Performance. Switching capacity: 32 Gbps.
Authentication Method. RADIUS, Secure Shell (SSH), TACACS+
NETWORK ROUTING AND ACCESS RESTRICTIONS
users, the network administrators must acquire knowledge transition from the engineers of
Cisco or other reputed vendors.
Task 13: Obtain latest technical specification and pricing by contacting
possible vendors.
Cisco is shortlisted as the vendor for the network equipment. The technical
specifications for these network equipment are:
Generic routers of Cisco C2514 or above versions
Specifications:
Ports : Two (2) DB-15 AUI 10BASE-T ethernet ports
Uplink Ports : Two (2) DB-60 serial port
Management ports : One (1) RJ-45 serial console and One (1) RJ-45 AUX
DRAM : 16MB
Management protocols : SNMP
Cost $1950
Cisco 2960 or similar switches
Specification:
Subtype. Fast Ethernet.
Ports. 24 x 10/100 + 2 x 10/100/1000.
Performance. Switching capacity: 32 Gbps.
Authentication Method. RADIUS, Secure Shell (SSH), TACACS+
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
13
NETWORK ROUTING AND ACCESS RESTRICTIONS
RAM. 64 MB.
MAC Address Table Size. 8K entries.
Authentication Method. Secure Shell (SSH), RADIUS, TACACS+
Status Indicators.
Cost $450
NETWORK ROUTING AND ACCESS RESTRICTIONS
RAM. 64 MB.
MAC Address Table Size. 8K entries.
Authentication Method. Secure Shell (SSH), RADIUS, TACACS+
Status Indicators.
Cost $450
14
NETWORK ROUTING AND ACCESS RESTRICTIONS
Bibliography
Abdullah, I.S.A. and Mustafa, A.B., 2016. The Impact of Distance on WLAN and LAN
Network Performance. International Journal of Science and Research, 5(3), pp.1063-1065.
Chen, X., Liu, X., Qian, Y., Gales, M.J. and Woodland, P.C., 2016, March. CUED-RNNLM
—An open-source toolkit for efficient training and evaluation of recurrent neural network
language models. In 2016 IEEE international conference on acoustics, speech and signal
processing (ICASSP) (pp. 6000-6004). IEEE.
Hsieh, K., Harlap, A., Vijaykumar, N., Konomis, D., Ganger, G.R., Gibbons, P.B. and Mutlu,
O., 2017. Gaia: Geo-Distributed Machine Learning Approaching {LAN} Speeds. In 14th
{USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 17) (pp.
629-647).
Huitao, W., Ruopeng, Y. and Xiaofei, Z., 2019, April. Research on IP Address Allocation of
Tactical Communication Network. In Journal of Physics: Conference Series (Vol. 1187, No.
4, p. 042105). IOP Publishing.
Rula, J.P., Bustamante, F.E. and Steiner, M., 2017, November. Cell spotting: studying the
role of cellular networks in the internet. In Proceedings of the 2017 Internet Measurement
Conference (pp. 191-204). ACM.
Wang, F., Mickens, J., Zeldovich, N. and Vaikuntanathan, V., 2016. Sieve: Cryptographically
enforced access control for user data in untrusted clouds. In 13th {USENIX} Symposium on
Networked Systems Design and Implementation ({NSDI} 16) (pp. 611-626).
Williams, W., Prasad, N., Mrva, D., Ash, T. and Robinson, T., 2015, April. Scaling recurrent
neural network language models. In 2015 IEEE International Conference on Acoustics,
Speech and Signal Processing (ICASSP) (pp. 5391-5395). IEEE.
NETWORK ROUTING AND ACCESS RESTRICTIONS
Bibliography
Abdullah, I.S.A. and Mustafa, A.B., 2016. The Impact of Distance on WLAN and LAN
Network Performance. International Journal of Science and Research, 5(3), pp.1063-1065.
Chen, X., Liu, X., Qian, Y., Gales, M.J. and Woodland, P.C., 2016, March. CUED-RNNLM
—An open-source toolkit for efficient training and evaluation of recurrent neural network
language models. In 2016 IEEE international conference on acoustics, speech and signal
processing (ICASSP) (pp. 6000-6004). IEEE.
Hsieh, K., Harlap, A., Vijaykumar, N., Konomis, D., Ganger, G.R., Gibbons, P.B. and Mutlu,
O., 2017. Gaia: Geo-Distributed Machine Learning Approaching {LAN} Speeds. In 14th
{USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 17) (pp.
629-647).
Huitao, W., Ruopeng, Y. and Xiaofei, Z., 2019, April. Research on IP Address Allocation of
Tactical Communication Network. In Journal of Physics: Conference Series (Vol. 1187, No.
4, p. 042105). IOP Publishing.
Rula, J.P., Bustamante, F.E. and Steiner, M., 2017, November. Cell spotting: studying the
role of cellular networks in the internet. In Proceedings of the 2017 Internet Measurement
Conference (pp. 191-204). ACM.
Wang, F., Mickens, J., Zeldovich, N. and Vaikuntanathan, V., 2016. Sieve: Cryptographically
enforced access control for user data in untrusted clouds. In 13th {USENIX} Symposium on
Networked Systems Design and Implementation ({NSDI} 16) (pp. 611-626).
Williams, W., Prasad, N., Mrva, D., Ash, T. and Robinson, T., 2015, April. Scaling recurrent
neural network language models. In 2015 IEEE International Conference on Acoustics,
Speech and Signal Processing (ICASSP) (pp. 5391-5395). IEEE.
15
NETWORK ROUTING AND ACCESS RESTRICTIONS
Yassin, A. and Yalcin, F., 2019. Enterprise transition to Software-defined networking in a
Wide Area Network: Best practices for a smooth transition to SD-WAN.
NETWORK ROUTING AND ACCESS RESTRICTIONS
Yassin, A. and Yalcin, F., 2019. Enterprise transition to Software-defined networking in a
Wide Area Network: Best practices for a smooth transition to SD-WAN.
1 out of 16
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.