BN202 Internetworking Technologies: Network Analysis & Plan

Verified

Added on  2023/04/03

|16
|1147
|247
Report
AI Summary
This report presents a network requirement analysis and plan for HiTech, focusing on eliminating current network problems and aligning the network with the organization's growth. The project scope includes dividing the network into sub-groups by department, reducing broadcast messages, minimizing packet loss and congestion, and improving network uptime. Functional requirements include enhancing bandwidth utilization, enabling load balancing, and using centralized network management. Non-functional requirements address user training, power backup, hardware compatibility, and topology selection. The network design employs a three-layer hierarchical model with a layer three switching device configured as a VTP server. The report also includes network topology diagrams, switch and router configurations, DHCP configuration details, and access point/server configuration guidelines, along with Netsim configurations and references.
Document Page
Running head: INTERNETWORKING TECHNOLOGIES
Assignment 2 - Network requirement analysis and plan
Name of the Student
Name of the University
Author’s Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
INTERNETWORKING TECHNOLOGIES
Project Scope
The implementation of network solution for HiTech would help the organization to eliminate the
current problems and the scope of the project are listed below:
Incorporating current organizational growth and aligning the network with the
organizational framework such that the design is optimized and help in increasing the
efficiency of the users.
Dividing the network into smaller sub groups according to the name of the department such
that the bandwidth is utilized efficiently and error in device of one of the department does
not affect the whole network.
To reduce the broadcast message and eliminate packet loss, jitter and congestion in the
network and increase the network uptime.
To handle large number of traffic from the different department and reduce the response
time of the network with the implementation of redundant link and virtualization of server.
To secure the router and switch configuration with password such that it cannot be modified
for creating backdoor for the intruder to access the internal resources of the network.
Project requirements
Functional Requirement
To minimize packet loss, congestion and jitter and enable quality of service for improving the
network performance.
To improve the utilization of bandwidth, traffic management and monitor the network for
identification of flow of data packets between the different areas of the network.
To enable load balancing and use multiple path to reach the destination address such that
the response is minimized and reliability of the network in improved.
To use centralized management of the network and configure the switch with VTP server
such that it can be used for configuring the VLAN and distributing with the client switches for
minimizing the configuration and troubleshooting time.
Document Page
2
INTERNETWORKING TECHNOLOGIES
To configure the router with DHCP scope such that the device connected in the network
automatically gets the IP address from the router interface.
To develop an IP address plan and record the IP address used for each of the subnet such
that the network can be troubleshoot for any errors easily
Non Functional Requirement
To develop a training plan for the users of the network for aware them about the
consequences of misusing the network or visiting malicious websites
To arrange power backup for the network device such that the network can withstand the
power disruption condition.
To identify the hardware device that are needed for the configuration of the network and
reviewing the compatibility of the device with the other device already installed in the
network.
To select a network topology that would be suitable for meeting the current organizational
structure and implement for redesigning the network.
Network Design strategy
For the development of the network design research is performed on the technology that can be
applied for the network development. Identification of the technology helps in selecting the
appropriate network device that is needed to be installed for management of communication
between each of the department. The design of the network is prepared based on the organizational
framework and implementation of three-layer hierarchical model such that redundancy of the
network is maintained and meets the functional and nonfunctional requirement. Layer three
switching device is selected as the core switch and configured as VTP server such that VLAN
information are shared with the client switches installed for distribution of the network and
connecting the end device. The redundant link are connected with the port and they are configured
as switch port mode trunk for carrying the VLAN information with the other network device. For
enabling the access of the VLAN for each of the network the switches are configured with switch
port mode access and the VLAN configured for the department are allowed access such that the PC
Document Page
3
INTERNETWORKING TECHNOLOGIES
connected with the switch automatically gets configured with the IP address configured in the router
for the intended department.
Network Topology Diagram
- Switch configuration (VLAN, Trunking)
- Router configuration (VLAN sub interface, Access lists)
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
INTERNETWORKING TECHNOLOGIES
Document Page
5
INTERNETWORKING TECHNOLOGIES
Document Page
6
INTERNETWORKING TECHNOLOGIES
- DHCP configuration (Scope creation with screen shot)
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
INTERNETWORKING TECHNOLOGIES
Document Page
8
INTERNETWORKING TECHNOLOGIES
- Access point, server configuration guidelines.
The access point and server configuration guidelines are used for documenting the details of the
configuration commands and protocols used for allowing or restricting access of the users to access
the network resources. For the development of the network the following guidelines are followed:
Installation of network device router/switches/server in secure place for restricting its
physical access from the users
Installation of the wireless access point is open space since the obstruction can degrade the
quality of signal and coverage area
Installation of the network device far from electrical interference because it can distort the
signal and causing packet loss and degradation of network performance.
It is needed to be ensured that the wireless access point is secured with encryption
password
Document Page
9
INTERNETWORKING TECHNOLOGIES
Detailed Network Design in Netsim
Network device configurations
a. Switch configuration:
- Set IP addresses on PC and switch
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10
INTERNETWORKING TECHNOLOGIES
- Create VLAN
- Ping each other
Document Page
11
INTERNETWORKING TECHNOLOGIES
- Set VTP domain with your first name
- Set VTP password with your family name
- Demonstrate VTP packets
Document Page
12
INTERNETWORKING TECHNOLOGIES
b. Router configuration
- set descriptions on interfaces, one with your name, second with your family name, third with your
middle name
- display information about directly connected devices to router
- Setup IP addresses for each interface.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13
INTERNETWORKING TECHNOLOGIES
- What is the subnet mask did you use?
The Subnet mask of 255.0.0.0 is used
- Ping all routers.
Document Page
14
INTERNETWORKING TECHNOLOGIES
Document Page
15
INTERNETWORKING TECHNOLOGIES
References:
[1]. Stojmenovic, I., Wen, S., Huang, X. and Luan, H. An overview of fog computing and its security
issues. Concurrency and Computation: Practice and Experience, 28(10), pp.2991-3005. , 2016.
[2]. Kang, S. and Yoon, W. SDN-based resource allocation for heterogeneous LTE and WLAN multi-
radio networks. The Journal of Supercomputing, 72(4), pp.1342-1362. , 2016.
[3]. Hayajneh, T., Ullah, S., Mohd, B.J. and Balagani, K.S. An Enhanced WLAN Security System with
FPGA Implementation for Multimedia Applications. IEEE Systems Journal, 11(4), pp.2536-2545. ,
2015.
[4]. Odagiri, K., Shimizu, S., Ishii, N. and Takizawa, M. Establishment of Virtual Policy Based Network
Management Scheme by Load Experimets in Virtual Environment. In 2015 IEEE 29th
International Conference on Advanced Information Networking and Applications (pp. 769-776).
IEEE. , 2015, March.
[5]. Shete, A., Lahade, A., Patil, T. and Pawar, R. DHCP Protocol Using OTP Based Two-Factor
Authentication. In 2018 2nd International Conference on Trends in Electronics and Informatics
(ICOEI) (pp. 136-141). IEEE. , 2018, May.
[6]. Tate, J., Beck, P., Ibarra, H.H., Kumaravel, S. and Miklas, L. Introduction to storage area networks.
IBM Redbooks. , 2018.
chevron_up_icon
1 out of 16
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]