This report discusses the different routing protocols, IP addressing, subnetting and other configuration mechanisms required to set up network infrastructure. The report starts by introducing to setting up networks. Then the report explains the different configuration mechanisms of networking which ends with discussion of NAT.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head:NETWORKING SET UP AND COMMUNICATIONS Networking Set Up and Communications Name of the Student Name of the University Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1NETWORKING SET UP AND COMMUNICATIONS Summary As per numerous studies on networking the different routing protocols, IP addressing, subnetting and other configuration mechanisms like ACL and NAT play a critical role in setting up networks. First the report introduces to building networks after which it explains the different configuration mechanisms of networking. The report after discussing the IP addressing and configuration mechanisms ends with concluding notes.
2NETWORKING SET UP AND COMMUNICATIONS Introduction to Networking........................................................................................................4 Cisco IOS...................................................................................................................................4 Networking Protocols.................................................................................................................5 Access........................................................................................................................................5 Ethernet......................................................................................................................................6 Network Layer...........................................................................................................................6 IP Addressing.............................................................................................................................6 Comparison............................................................................................................................7 Subnet Classification..................................................................................................................7 Transport Layer..........................................................................................................................8 Application Layer.......................................................................................................................8 Small Network...........................................................................................................................9 IPv6 Address and Troubleshoot...............................................................................................12 Static Routes in Routers...........................................................................................................13 RIPv2 Routing..........................................................................................................................15 Switch Virtual Interface...........................................................................................................18 Port Security to Restrict...........................................................................................................19 VLAN Switchport Modes........................................................................................................20 ACL..........................................................................................................................................22 DHCP.......................................................................................................................................24 NAT Configuration..................................................................................................................26
3NETWORKING SET UP AND COMMUNICATIONS Routing Concepts.....................................................................................................................26 Static Routing...........................................................................................................................27 Advantage............................................................................................................................27 Disadvantage........................................................................................................................27 Types and Purpose...............................................................................................................27 Dynamic Routing.....................................................................................................................27 VLAN.......................................................................................................................................28 ACL..........................................................................................................................................28 DHCPv4...................................................................................................................................28 NAT..........................................................................................................................................28 Conclusion................................................................................................................................29 References................................................................................................................................30
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4NETWORKING SET UP AND COMMUNICATIONS Introduction to Networking For organizations to set up their network infrastructure, the most essential devices are always the routers and switches that make the network connection accessible. The IP network available must be broken into smaller subnets to efficiently distribute the connections among the different segments of the organization’s network. This involves IP addressing and subnet calculations to be made to specifically meet the requirements of the particular network segment.Tooperateeffectively,networksmustfollowstandardmodelsofnetwork communications. Cisco IOS The Cisco IOS version of routers and switches of a network can be viewed by entering the IOS terminal of these network devices and inserting commands for viewing the make, model and specifications of the network device using ‘show version’ command in privileged access mode (Hlyne, Zavarsky and Butakov 2015). For example, IOS version Cisco 2811 routers from Cisco Packet Tracer is found to be 12.4.
5NETWORKING SET UP AND COMMUNICATIONS Networking Protocols The key protocols that are used in networksto facilitate LAN communications in small and medium sized networks are Internet IP, TCP and DNS (Shang et al. 2016). They share many common characteristics like identifying source and destination. The protocols alsodefinehowmessagesaretransmittedlikemessageencoding,formattingand encapsulation, specifying size, timings and delivery. Access Data Link Layer functions as the most reliable data delivery from one node to another.This formats the frames with L3 packets that are to be used in a different media and
6NETWORKING SET UP AND COMMUNICATIONS might require different protocols. After every hop down the route, devices receive these frames from a medium, performs de-encapsulation and then forwards it to packets in next frame. Headers of these frames get formatted according to the media they are to cover. Ethernet Ethernetworks by separating the Data Link layer functionalities to distinctsub layers namely the LLC (Logical Link Control)and the MAC (Media Access Control).As per OSI model, the functions of the Data Link layer get assigned to the sub layers like LLC or MAC. The address values of MAC have resulted from IEEE rules of vendors for ensuring addresses that are globally unique for all Ethernet devices. Major fields of the Ethernet frame are preamble, start of frame delimiter (SFD), destination address, source address, length, data and cyclic redundancy check or CRC Network Layer Protocols in the network layer are a set of rules that govern communications over the network. They can be rules for various services like transmission of data, sessions for initializationandterminationofcommunications,IPaddressingandevenrouting, authentication services and credential verifications, encryption techniques as also message compression and error corrections. IPX, RIP, RTMP are among the different network layer or layer 3 protocols generally used for routing practises. RIP involves periodic broadcasting of routing table information across the networks. IP Addressing The three different types of IPv6 network addresses are unicast, broadcast and multicast.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7NETWORKING SET UP AND COMMUNICATIONS Comparison Unicast refers to communications where point to point data transfer is happening between a sender and a receiver. Broadcast refers to the communication where point to point data exchange takes place among one sender and multiple receivers. Multicast refers to point to point data transfers among multiple senders and multiple receivers. Subnet Classification In the classification of subnet A, the IP addressing is performed by dividing the network 192.168.1.0/24 into a subnet with smaller available address space (Syed 2017). Here, the network address is always the first IP address of the subnet - 192.168.1.0 and broadcast address - 192.168.1.63. Host addresses constitute rest of the IPs - 192.168.1.1-192.168.1.62. The VLSM calculation of network 192.168.1.0 with mask /24 is given below for subnet-A requiring connections for 35 hostsand the address space allocated is 62 hosts. Subne t Siz e Allocate d Network CID R MaskIP RangeBroadcast A3562 192.168.1. 0 /26 255.255.255.1 92 192.168.1.1 - 192.168.1.6 2 192.168.1.6 3
8NETWORKING SET UP AND COMMUNICATIONS Transport Layer The role of the Transport layer is about accepting data from above layers, to split them into smaller ones, send them over to Network layer and ensure all the units have arrived in the specified order. A key difference between TCP and UDP protocols is that TCP guarantees data delivery to router of destination. Data delivery to destination is not guaranteed by UDP. TCP also performs sequencing of data which is not done by UDP. TCP protocol is appropriate for sizeable data transfers (> 1 kB) while UDP is favourable in tunnelling or VPN based connections where tunnelled protocols deal with the lost packets. Application Layer The presentation layer formats and converts data and ensures the data remains presentable for applications throughout the network. The session layer ensures coordination of communications among the applications. Application layer allows applications as well as users to transfer data files across the network and throughout the internetwork. Both DNS and DHCPoperate on client-server architecture yet are very different in the way they function (Satam et al. 2015).DNS works bymapping domain names with IP addresses while theDHCPprotocol serves in automatically assigning IPs to hosts connected to the network.
9NETWORKING SET UP AND COMMUNICATIONS Small Network
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10NETWORKING SET UP AND COMMUNICATIONS Above screenshot shows IPv4 addressing in serial interface.
11NETWORKING SET UP AND COMMUNICATIONS Ping between devices of same network and different networks. Networks 192.168.10.0 and 192.168.20.0 communicate through static routing while 192.168.10.0 and 192.168.30.0 communicate with RIP routing.
12NETWORKING SET UP AND COMMUNICATIONS IPv6 Address and Troubleshoot IPv6 link local address of PC0 is pinged from server successfully.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
26NETWORKING SET UP AND COMMUNICATIONS NAT Configuration Routing Concepts The primary features of routers are network segmentation, IP allocation, firewall set up and file sharing. Routersarenetworkingdeviceswhichforwarddatapacketsacross networks.Functions like directing of traffic on Internet is performed by the router. Routersalso route packets based on information obtained fromroutingtables at any specificinstance.Prior to forwardingpacketstoanotherrouter, therouterassumesthe otherroutertodothe same that is takedecisionsas per information in their ownroutingtable.
27NETWORKING SET UP AND COMMUNICATIONS Static Routing Advantage Static routing is very easy to implement in smaller networks. Disadvantage This routing protocol is only suitable for simpler topologies or specific role like default static route. Types and Purpose Static Routes mainly differs as standard and null static routes.Static routes consist of destination network address, the subnet mask and the host address of the next-hop. Null routes consist of destination network addresses, subnet masks as also therejectkeyword orthe blackholekeyword. Dynamic Routing Dynamic routing protocols include RIP or Routing Information Protocol and OSPF or Open Shortest Path First.When RIP is used, routing switches can learn routes from advertisements sent by other RIP routers to this routing switch (Masood, Abuhelala and Glesk 2016). Unlike static routing complete hop details is not required, only the networks must be stored. #NetworkHopInterface A1192.168.4.0192.168.4.2Se0/0/0 A2192.168.20.0192.168.20.1Fa0/0.20
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
28NETWORKING SET UP AND COMMUNICATIONS From the above routing table, it can be known that the network 192.168.4.0 is recognized by the router through static route with interface Se0/0/0 of the next router with IP address 192.168.4.2. VLAN VLANs are used by the switches for isolating network segments from rest of the network. This allows application of greater controls on network segments. To make VLANs effective the interfaces of hosts must be configured accordingly. ACL The ACL or Access Control List commands are used in setting additional permissions and restrictions over network segments (Wang et al. 2016). These can be preventing or allowing communications between different networks. DHCPv4 DHCPv4functions in a client and server communication method. First the client places a request to theDHCPv4server and the server accordingly generates and assigns the appropriate IPv4 address to this client. NAT NetworkAddressTranslationorNATconductsIPaddress-basedconservations. Itoperates on routers involving connection of twodifferentnetworksand then translates private addressesofthe internalnetworkinto legaladdresseseven prior to forwarding of network packets.
29NETWORKING SET UP AND COMMUNICATIONS Conclusion To conclude, the report successfully discusses the different routing protocols, IP addressing, subnetting and other configuration mechanisms required to set up network infrastructure. The report is observed to start by introducing to setting up networks. Then the report explains the different configuration mechanisms of networking which ends with discussion of NAT.
30NETWORKING SET UP AND COMMUNICATIONS References Hlyne, C.N.N., Zavarsky, P. and Butakov, S., 2015, December. SCAP benchmark for Cisco router security configuration compliance. In2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)(pp. 270-276). IEEE. Masood, M., Abuhelala, M. and Glesk, I., 2016, December. Detailed analysis of routing protocolswithdifferentnetworklimitations.In20thSlovak-Czech-PolishOptical ConferenceonWaveandQuantumAspectsofContemporaryOptics(Vol.10142,p. 101421T). International Society for Optics and Photonics. Satam, P., Alipour, H., Al-Nashif, Y.B. and Hariri, S., 2015. Anomaly Behavior Analysis of DNS Protocol.J. Internet Serv. Inf. Secur.,5(4), pp.85-97. Shang, W., Yu, Y., Droms, R. and Zhang, L., 2016. Challenges in IoT networking via TCP/IP architecture.Technical Report NDN-0038. NDN Project. Syed, Z.A., 2017. IP Addressing. Wang, F., Mickens, J., Zeldovich, N. and Vaikuntanathan, V., 2016. Sieve: Cryptographically enforced access control for user data in untrusted clouds. In13th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 16)(pp. 611-626).