Networking Set Up and Communications
VerifiedAdded on 2022/11/14
|31
|1967
|114
AI Summary
This report discusses the different routing protocols, IP addressing, subnetting and other configuration mechanisms required to set up network infrastructure. The report starts by introducing to setting up networks. Then the report explains the different configuration mechanisms of networking which ends with discussion of NAT.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: NETWORKING SET UP AND COMMUNICATIONS
Networking Set Up and Communications
Name of the Student
Name of the University
Author Note
Networking Set Up and Communications
Name of the Student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1NETWORKING SET UP AND COMMUNICATIONS
Summary
As per numerous studies on networking the different routing protocols, IP addressing,
subnetting and other configuration mechanisms like ACL and NAT play a critical role in
setting up networks. First the report introduces to building networks after which it explains
the different configuration mechanisms of networking. The report after discussing the IP
addressing and configuration mechanisms ends with concluding notes.
Summary
As per numerous studies on networking the different routing protocols, IP addressing,
subnetting and other configuration mechanisms like ACL and NAT play a critical role in
setting up networks. First the report introduces to building networks after which it explains
the different configuration mechanisms of networking. The report after discussing the IP
addressing and configuration mechanisms ends with concluding notes.
2NETWORKING SET UP AND COMMUNICATIONS
Introduction to Networking........................................................................................................4
Cisco IOS...................................................................................................................................4
Networking Protocols.................................................................................................................5
Access........................................................................................................................................5
Ethernet......................................................................................................................................6
Network Layer...........................................................................................................................6
IP Addressing.............................................................................................................................6
Comparison............................................................................................................................7
Subnet Classification..................................................................................................................7
Transport Layer..........................................................................................................................8
Application Layer.......................................................................................................................8
Small Network...........................................................................................................................9
IPv6 Address and Troubleshoot...............................................................................................12
Static Routes in Routers...........................................................................................................13
RIPv2 Routing..........................................................................................................................15
Switch Virtual Interface...........................................................................................................18
Port Security to Restrict...........................................................................................................19
VLAN Switchport Modes........................................................................................................20
ACL..........................................................................................................................................22
DHCP.......................................................................................................................................24
NAT Configuration..................................................................................................................26
Introduction to Networking........................................................................................................4
Cisco IOS...................................................................................................................................4
Networking Protocols.................................................................................................................5
Access........................................................................................................................................5
Ethernet......................................................................................................................................6
Network Layer...........................................................................................................................6
IP Addressing.............................................................................................................................6
Comparison............................................................................................................................7
Subnet Classification..................................................................................................................7
Transport Layer..........................................................................................................................8
Application Layer.......................................................................................................................8
Small Network...........................................................................................................................9
IPv6 Address and Troubleshoot...............................................................................................12
Static Routes in Routers...........................................................................................................13
RIPv2 Routing..........................................................................................................................15
Switch Virtual Interface...........................................................................................................18
Port Security to Restrict...........................................................................................................19
VLAN Switchport Modes........................................................................................................20
ACL..........................................................................................................................................22
DHCP.......................................................................................................................................24
NAT Configuration..................................................................................................................26
3NETWORKING SET UP AND COMMUNICATIONS
Routing Concepts.....................................................................................................................26
Static Routing...........................................................................................................................27
Advantage............................................................................................................................27
Disadvantage........................................................................................................................27
Types and Purpose...............................................................................................................27
Dynamic Routing.....................................................................................................................27
VLAN.......................................................................................................................................28
ACL..........................................................................................................................................28
DHCPv4...................................................................................................................................28
NAT..........................................................................................................................................28
Conclusion................................................................................................................................29
References................................................................................................................................30
Routing Concepts.....................................................................................................................26
Static Routing...........................................................................................................................27
Advantage............................................................................................................................27
Disadvantage........................................................................................................................27
Types and Purpose...............................................................................................................27
Dynamic Routing.....................................................................................................................27
VLAN.......................................................................................................................................28
ACL..........................................................................................................................................28
DHCPv4...................................................................................................................................28
NAT..........................................................................................................................................28
Conclusion................................................................................................................................29
References................................................................................................................................30
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4NETWORKING SET UP AND COMMUNICATIONS
Introduction to Networking
For organizations to set up their network infrastructure, the most essential devices are
always the routers and switches that make the network connection accessible. The IP network
available must be broken into smaller subnets to efficiently distribute the connections among
the different segments of the organization’s network. This involves IP addressing and subnet
calculations to be made to specifically meet the requirements of the particular network
segment. To operate effectively, networks must follow standard models of network
communications.
Cisco IOS
The Cisco IOS version of routers and switches of a network can be viewed by
entering the IOS terminal of these network devices and inserting commands for viewing the
make, model and specifications of the network device using ‘show version’ command in
privileged access mode (Hlyne, Zavarsky and Butakov 2015). For example, IOS version
Cisco 2811 routers from Cisco Packet Tracer is found to be 12.4.
Introduction to Networking
For organizations to set up their network infrastructure, the most essential devices are
always the routers and switches that make the network connection accessible. The IP network
available must be broken into smaller subnets to efficiently distribute the connections among
the different segments of the organization’s network. This involves IP addressing and subnet
calculations to be made to specifically meet the requirements of the particular network
segment. To operate effectively, networks must follow standard models of network
communications.
Cisco IOS
The Cisco IOS version of routers and switches of a network can be viewed by
entering the IOS terminal of these network devices and inserting commands for viewing the
make, model and specifications of the network device using ‘show version’ command in
privileged access mode (Hlyne, Zavarsky and Butakov 2015). For example, IOS version
Cisco 2811 routers from Cisco Packet Tracer is found to be 12.4.
5NETWORKING SET UP AND COMMUNICATIONS
Networking Protocols
The key protocols that are used in networks to facilitate LAN communications in
small and medium sized networks are Internet IP, TCP and DNS (Shang et al. 2016). They
share many common characteristics like identifying source and destination. The protocols
also define how messages are transmitted like message encoding, formatting and
encapsulation, specifying size, timings and delivery.
Access
Data Link Layer functions as the most reliable data delivery from one node to
another. This formats the frames with L3 packets that are to be used in a different media and
Networking Protocols
The key protocols that are used in networks to facilitate LAN communications in
small and medium sized networks are Internet IP, TCP and DNS (Shang et al. 2016). They
share many common characteristics like identifying source and destination. The protocols
also define how messages are transmitted like message encoding, formatting and
encapsulation, specifying size, timings and delivery.
Access
Data Link Layer functions as the most reliable data delivery from one node to
another. This formats the frames with L3 packets that are to be used in a different media and
6NETWORKING SET UP AND COMMUNICATIONS
might require different protocols. After every hop down the route, devices receive these
frames from a medium, performs de-encapsulation and then forwards it to packets in next
frame. Headers of these frames get formatted according to the media they are to cover.
Ethernet
Ethernet works by separating the Data Link layer functionalities to distinct sub layers
namely the LLC (Logical Link Control) and the MAC (Media Access Control). As per OSI
model, the functions of the Data Link layer get assigned to the sub layers like LLC or MAC.
The address values of MAC have resulted from IEEE rules of vendors for ensuring
addresses that are globally unique for all Ethernet devices.
Major fields of the Ethernet frame are preamble, start of frame delimiter (SFD),
destination address, source address, length, data and cyclic redundancy check or CRC
Network Layer
Protocols in the network layer are a set of rules that govern communications over the
network. They can be rules for various services like transmission of data, sessions for
initialization and termination of communications, IP addressing and even routing,
authentication services and credential verifications, encryption techniques as also message
compression and error corrections.
IPX, RIP, RTMP are among the different network layer or layer 3 protocols generally
used for routing practises. RIP involves periodic broadcasting of routing table information
across the networks.
IP Addressing
The three different types of IPv6 network addresses are unicast, broadcast and multicast.
might require different protocols. After every hop down the route, devices receive these
frames from a medium, performs de-encapsulation and then forwards it to packets in next
frame. Headers of these frames get formatted according to the media they are to cover.
Ethernet
Ethernet works by separating the Data Link layer functionalities to distinct sub layers
namely the LLC (Logical Link Control) and the MAC (Media Access Control). As per OSI
model, the functions of the Data Link layer get assigned to the sub layers like LLC or MAC.
The address values of MAC have resulted from IEEE rules of vendors for ensuring
addresses that are globally unique for all Ethernet devices.
Major fields of the Ethernet frame are preamble, start of frame delimiter (SFD),
destination address, source address, length, data and cyclic redundancy check or CRC
Network Layer
Protocols in the network layer are a set of rules that govern communications over the
network. They can be rules for various services like transmission of data, sessions for
initialization and termination of communications, IP addressing and even routing,
authentication services and credential verifications, encryption techniques as also message
compression and error corrections.
IPX, RIP, RTMP are among the different network layer or layer 3 protocols generally
used for routing practises. RIP involves periodic broadcasting of routing table information
across the networks.
IP Addressing
The three different types of IPv6 network addresses are unicast, broadcast and multicast.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7NETWORKING SET UP AND COMMUNICATIONS
Comparison
Unicast refers to communications where point to point data transfer is happening
between a sender and a receiver.
Broadcast refers to the communication where point to point data exchange takes place
among one sender and multiple receivers.
Multicast refers to point to point data transfers among multiple senders and multiple
receivers.
Subnet Classification
In the classification of subnet A, the IP addressing is performed by dividing the
network 192.168.1.0/24 into a subnet with smaller available address space (Syed 2017). Here,
the network address is always the first IP address of the subnet - 192.168.1.0 and broadcast
address - 192.168.1.63. Host addresses constitute rest of the IPs - 192.168.1.1-192.168.1.62.
The VLSM calculation of network 192.168.1.0 with mask /24 is given below for
subnet-A requiring connections for 35 hosts and the address space allocated is 62 hosts.
Subne
t
Siz
e
Allocate
d
Network
CID
R
Mask IP Range Broadcast
A 35 62
192.168.1.
0
/26
255.255.255.1
92
192.168.1.1
-
192.168.1.6
2
192.168.1.6
3
Comparison
Unicast refers to communications where point to point data transfer is happening
between a sender and a receiver.
Broadcast refers to the communication where point to point data exchange takes place
among one sender and multiple receivers.
Multicast refers to point to point data transfers among multiple senders and multiple
receivers.
Subnet Classification
In the classification of subnet A, the IP addressing is performed by dividing the
network 192.168.1.0/24 into a subnet with smaller available address space (Syed 2017). Here,
the network address is always the first IP address of the subnet - 192.168.1.0 and broadcast
address - 192.168.1.63. Host addresses constitute rest of the IPs - 192.168.1.1-192.168.1.62.
The VLSM calculation of network 192.168.1.0 with mask /24 is given below for
subnet-A requiring connections for 35 hosts and the address space allocated is 62 hosts.
Subne
t
Siz
e
Allocate
d
Network
CID
R
Mask IP Range Broadcast
A 35 62
192.168.1.
0
/26
255.255.255.1
92
192.168.1.1
-
192.168.1.6
2
192.168.1.6
3
8NETWORKING SET UP AND COMMUNICATIONS
Transport Layer
The role of the Transport layer is about accepting data from above layers, to split
them into smaller ones, send them over to Network layer and ensure all the units have arrived
in the specified order.
A key difference between TCP and UDP protocols is that TCP guarantees data
delivery to router of destination. Data delivery to destination is not guaranteed by UDP. TCP
also performs sequencing of data which is not done by UDP.
TCP protocol is appropriate for sizeable data transfers (> 1 kB) while UDP is
favourable in tunnelling or VPN based connections where tunnelled protocols deal with the
lost packets.
Application Layer
The presentation layer formats and converts data and ensures the data remains
presentable for applications throughout the network. The session layer ensures coordination
of communications among the applications. Application layer allows applications as well as
users to transfer data files across the network and throughout the internetwork.
Both DNS and DHCP operate on client-server architecture yet are very different in
the way they function (Satam et al. 2015). DNS works by mapping domain names with IP
addresses while the DHCP protocol serves in automatically assigning IPs to hosts connected
to the network.
Transport Layer
The role of the Transport layer is about accepting data from above layers, to split
them into smaller ones, send them over to Network layer and ensure all the units have arrived
in the specified order.
A key difference between TCP and UDP protocols is that TCP guarantees data
delivery to router of destination. Data delivery to destination is not guaranteed by UDP. TCP
also performs sequencing of data which is not done by UDP.
TCP protocol is appropriate for sizeable data transfers (> 1 kB) while UDP is
favourable in tunnelling or VPN based connections where tunnelled protocols deal with the
lost packets.
Application Layer
The presentation layer formats and converts data and ensures the data remains
presentable for applications throughout the network. The session layer ensures coordination
of communications among the applications. Application layer allows applications as well as
users to transfer data files across the network and throughout the internetwork.
Both DNS and DHCP operate on client-server architecture yet are very different in
the way they function (Satam et al. 2015). DNS works by mapping domain names with IP
addresses while the DHCP protocol serves in automatically assigning IPs to hosts connected
to the network.
9NETWORKING SET UP AND COMMUNICATIONS
Small Network
Small Network
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10NETWORKING SET UP AND COMMUNICATIONS
Above screenshot shows IPv4 addressing in serial interface.
Above screenshot shows IPv4 addressing in serial interface.
11NETWORKING SET UP AND COMMUNICATIONS
Ping between devices of same network and different networks. Networks 192.168.10.0 and
192.168.20.0 communicate through static routing while 192.168.10.0 and 192.168.30.0
communicate with RIP routing.
Ping between devices of same network and different networks. Networks 192.168.10.0 and
192.168.20.0 communicate through static routing while 192.168.10.0 and 192.168.30.0
communicate with RIP routing.
12NETWORKING SET UP AND COMMUNICATIONS
IPv6 Address and Troubleshoot
IPv6 link local address of PC0 is pinged from server successfully.
IPv6 Address and Troubleshoot
IPv6 link local address of PC0 is pinged from server successfully.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
13NETWORKING SET UP AND COMMUNICATIONS
Static Routes in Routers
Static Routes in Routers
14NETWORKING SET UP AND COMMUNICATIONS
15NETWORKING SET UP AND COMMUNICATIONS
RIPv2 Routing
The same RIP configuration is applied on the other two routers.
RIPv2 Routing
The same RIP configuration is applied on the other two routers.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
16NETWORKING SET UP AND COMMUNICATIONS
www.cisco.com is hosted by the DNS server
www.cisco.com is hosted by the DNS server
17NETWORKING SET UP AND COMMUNICATIONS
This website can be traced from PC0.
This website can be traced from PC0.
18NETWORKING SET UP AND COMMUNICATIONS
Switch Virtual Interface
Switch Virtual Interface
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
19NETWORKING SET UP AND COMMUNICATIONS
Port Security to Restrict
Port Security to Restrict
20NETWORKING SET UP AND COMMUNICATIONS
VLAN Switchport Modes
VLAN Switchport Modes
21NETWORKING SET UP AND COMMUNICATIONS
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
22NETWORKING SET UP AND COMMUNICATIONS
ACL
ACL
23NETWORKING SET UP AND COMMUNICATIONS
ACL configuration blocks ping successfully.
ACL configuration blocks ping successfully.
24NETWORKING SET UP AND COMMUNICATIONS
DHCP
DHCP
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
25NETWORKING SET UP AND COMMUNICATIONS
26NETWORKING SET UP AND COMMUNICATIONS
NAT Configuration
Routing Concepts
The primary features of routers are network segmentation, IP allocation, firewall set
up and file sharing.
Routers are networking devices which forward data packets across
networks. Functions like directing of traffic on Internet is performed by the router.
Routers also route packets based on information obtained from routing tables at any
specific instance. Prior to forwarding packets to another router, the router assumes the
other router to do the same that is take decisions as per information in their own routing table.
NAT Configuration
Routing Concepts
The primary features of routers are network segmentation, IP allocation, firewall set
up and file sharing.
Routers are networking devices which forward data packets across
networks. Functions like directing of traffic on Internet is performed by the router.
Routers also route packets based on information obtained from routing tables at any
specific instance. Prior to forwarding packets to another router, the router assumes the
other router to do the same that is take decisions as per information in their own routing table.
27NETWORKING SET UP AND COMMUNICATIONS
Static Routing
Advantage
Static routing is very easy to implement in smaller networks.
Disadvantage
This routing protocol is only suitable for simpler topologies or specific role like default static
route.
Types and Purpose
Static Routes mainly differs as standard and null static routes. Static routes consist of
destination network address, the subnet mask and the host address of the next-hop. Null
routes consist of destination network addresses, subnet masks as also the reject keyword
or the blackhole keyword.
Dynamic Routing
Dynamic routing protocols include RIP or Routing Information Protocol and OSPF or
Open Shortest Path First. When RIP is used, routing switches can learn routes from
advertisements sent by other RIP routers to this routing switch (Masood, Abuhelala and
Glesk 2016).
Unlike static routing complete hop details is not required, only the networks must be
stored.
# Network Hop Interface
A1 192.168.4.0 192.168.4.2 Se0/0/0
A2 192.168.20.0 192.168.20.1 Fa0/0.20
Static Routing
Advantage
Static routing is very easy to implement in smaller networks.
Disadvantage
This routing protocol is only suitable for simpler topologies or specific role like default static
route.
Types and Purpose
Static Routes mainly differs as standard and null static routes. Static routes consist of
destination network address, the subnet mask and the host address of the next-hop. Null
routes consist of destination network addresses, subnet masks as also the reject keyword
or the blackhole keyword.
Dynamic Routing
Dynamic routing protocols include RIP or Routing Information Protocol and OSPF or
Open Shortest Path First. When RIP is used, routing switches can learn routes from
advertisements sent by other RIP routers to this routing switch (Masood, Abuhelala and
Glesk 2016).
Unlike static routing complete hop details is not required, only the networks must be
stored.
# Network Hop Interface
A1 192.168.4.0 192.168.4.2 Se0/0/0
A2 192.168.20.0 192.168.20.1 Fa0/0.20
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
28NETWORKING SET UP AND COMMUNICATIONS
From the above routing table, it can be known that the network 192.168.4.0 is
recognized by the router through static route with interface Se0/0/0 of the next router with IP
address 192.168.4.2.
VLAN
VLANs are used by the switches for isolating network segments from rest of the
network. This allows application of greater controls on network segments. To make VLANs
effective the interfaces of hosts must be configured accordingly.
ACL
The ACL or Access Control List commands are used in setting additional permissions
and restrictions over network segments (Wang et al. 2016). These can be preventing or
allowing communications between different networks.
DHCPv4
DHCPv4 functions in a client and server communication method. First the client
places a request to the DHCPv4 server and the server accordingly generates and assigns the
appropriate IPv4 address to this client.
NAT
Network Address Translation or NAT conducts IP address-based conservations.
It operates on routers involving connection of two different networks and then translates
private addresses of the internal network into legal addresses even prior to forwarding of
network packets.
From the above routing table, it can be known that the network 192.168.4.0 is
recognized by the router through static route with interface Se0/0/0 of the next router with IP
address 192.168.4.2.
VLAN
VLANs are used by the switches for isolating network segments from rest of the
network. This allows application of greater controls on network segments. To make VLANs
effective the interfaces of hosts must be configured accordingly.
ACL
The ACL or Access Control List commands are used in setting additional permissions
and restrictions over network segments (Wang et al. 2016). These can be preventing or
allowing communications between different networks.
DHCPv4
DHCPv4 functions in a client and server communication method. First the client
places a request to the DHCPv4 server and the server accordingly generates and assigns the
appropriate IPv4 address to this client.
NAT
Network Address Translation or NAT conducts IP address-based conservations.
It operates on routers involving connection of two different networks and then translates
private addresses of the internal network into legal addresses even prior to forwarding of
network packets.
29NETWORKING SET UP AND COMMUNICATIONS
Conclusion
To conclude, the report successfully discusses the different routing protocols, IP
addressing, subnetting and other configuration mechanisms required to set up network
infrastructure. The report is observed to start by introducing to setting up networks. Then the
report explains the different configuration mechanisms of networking which ends with
discussion of NAT.
Conclusion
To conclude, the report successfully discusses the different routing protocols, IP
addressing, subnetting and other configuration mechanisms required to set up network
infrastructure. The report is observed to start by introducing to setting up networks. Then the
report explains the different configuration mechanisms of networking which ends with
discussion of NAT.
30NETWORKING SET UP AND COMMUNICATIONS
References
Hlyne, C.N.N., Zavarsky, P. and Butakov, S., 2015, December. SCAP benchmark for Cisco
router security configuration compliance. In 2015 10th International Conference for Internet
Technology and Secured Transactions (ICITST) (pp. 270-276). IEEE.
Masood, M., Abuhelala, M. and Glesk, I., 2016, December. Detailed analysis of routing
protocols with different network limitations. In 20th Slovak-Czech-Polish Optical
Conference on Wave and Quantum Aspects of Contemporary Optics (Vol. 10142, p.
101421T). International Society for Optics and Photonics.
Satam, P., Alipour, H., Al-Nashif, Y.B. and Hariri, S., 2015. Anomaly Behavior Analysis of
DNS Protocol. J. Internet Serv. Inf. Secur., 5(4), pp.85-97.
Shang, W., Yu, Y., Droms, R. and Zhang, L., 2016. Challenges in IoT networking via TCP/IP
architecture. Technical Report NDN-0038. NDN Project.
Syed, Z.A., 2017. IP Addressing.
Wang, F., Mickens, J., Zeldovich, N. and Vaikuntanathan, V., 2016. Sieve: Cryptographically
enforced access control for user data in untrusted clouds. In 13th {USENIX} Symposium on
Networked Systems Design and Implementation ({NSDI} 16) (pp. 611-626).
References
Hlyne, C.N.N., Zavarsky, P. and Butakov, S., 2015, December. SCAP benchmark for Cisco
router security configuration compliance. In 2015 10th International Conference for Internet
Technology and Secured Transactions (ICITST) (pp. 270-276). IEEE.
Masood, M., Abuhelala, M. and Glesk, I., 2016, December. Detailed analysis of routing
protocols with different network limitations. In 20th Slovak-Czech-Polish Optical
Conference on Wave and Quantum Aspects of Contemporary Optics (Vol. 10142, p.
101421T). International Society for Optics and Photonics.
Satam, P., Alipour, H., Al-Nashif, Y.B. and Hariri, S., 2015. Anomaly Behavior Analysis of
DNS Protocol. J. Internet Serv. Inf. Secur., 5(4), pp.85-97.
Shang, W., Yu, Y., Droms, R. and Zhang, L., 2016. Challenges in IoT networking via TCP/IP
architecture. Technical Report NDN-0038. NDN Project.
Syed, Z.A., 2017. IP Addressing.
Wang, F., Mickens, J., Zeldovich, N. and Vaikuntanathan, V., 2016. Sieve: Cryptographically
enforced access control for user data in untrusted clouds. In 13th {USENIX} Symposium on
Networked Systems Design and Implementation ({NSDI} 16) (pp. 611-626).
1 out of 31
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.