ICTDB502 - Design a Database: WAN Links and Database Designing Report

Verified

Added on  2022/12/03

|11
|1882
|112
Report
AI Summary
This report, prepared by Vikrampreet Singh for FAST, addresses the configuration and installation of Wide Area Network (WAN) links for DEF, a local manufacturing company. The report details the necessary steps, including reviewing existing network designs, selecting appropriate equipment (like Cisco SF300-48PP switches), and adhering to relevant safety and work health standards. It covers the implementation process, from accessing the site and installing WAN components to developing contingency plans and obtaining approvals. The report also explores configuring Access Control Lists (ACLs) on routers, utilizing router debug commands, troubleshooting WAN link issues, and differentiating between IPv4 and IPv6 protocols. The report also includes answers to questions about SQL Server authentication methods, predefined server roles, and Windows Authentication advantages, demonstrating a comprehensive understanding of network and database design principles.
Document Page
Running head: DATABASE DESIGNING
Assessment 1: Written Assessment
Student Name: Ahmed Sher
Student ID: 39832
Unit Code: ICTDB502
Unit Name: Design a database
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1DATABASE DESIGNING
Table of Contents
Introduction:....................................................................................................................................2
Relevant legislation, Safety Codes and Work health, standards and regulations:...........................2
Access the site with respect to DEF methods..................................................................................4
Review the existing network design................................................................................................4
Equipment required to meet the technical requirements.................................................................4
Installing the WAN elements...........................................................................................................5
Availability of Requirement:...........................................................................................................6
Develop a plan consisting of contingency arrangements and prioritized operations......................6
Approval of the Plan consisting timing and security.......................................................................7
Purpose of Setting the ACLs on the router......................................................................................8
Purpose of the router debug command............................................................................................8
Issues related to the installation and solution of WAN links...........................................................9
Differences between IPv4 and IPv6:...............................................................................................9
Document Page
2DATABASE DESIGNING
Introduction:
DEF is the local manufacturing organization with the head office located in the CBD.
The IT manager, Mr. Smith is been nominated by organization as DEF employee in charge who
will look after all the operations in the WAN implementation method. The organization officials
want me to structure as well as install the WAN links for the company, that includes setting of
VPN for site-to-site connection and I have been asked to submit a written report describing the
setting of WAN links on behalf of the organization. This written report is submitted by
Vikrampreet Singh (37859), an employee of an IT network organization namely, FAST.
Relevant legislation, Safety Codes and Work health, standards and
regulations:
Elements that represents the required
output
Performance criteria which describe the
operations to be made for achieving the
elements
Prepare to implement medium enterprise
WAN connections
Prepare for the given operation with respect to
the safety codes and work health, standards,
legislation and regulations
Arrange the access to site with respect to the
needed method
Review the existing network design which
will ensure completion of the network design.
Select the elements of the network that are
needed to be installed such it meet the
Document Page
3DATABASE DESIGNING
technical needs.
Contact respective suppliers or vendors to
achieve specification as well as availability of
the identified elements.
Develop the plans with contingency
arrangements and prioritized operations for
the implementations of elements in minimum
interruption to the users.
Liaise with respective people to achieve the
approval of the plans which includes security
timing and clearance.
Configuring the WAN links Determining of various methods to connect a
WAN.
Verify and configure the simple serial WAN
configuration
Verify and configure two WAN protocols.
Determine the VPN technology
Verify and configure a site-to-site VPN
technology.
Determine the asymmetric digital subscriber
line (ADSL) technique
Verify and configure the ADSL connection or
links
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4DATABASE DESIGNING
Access the site with respect to DEF methods
They want a surety which will describe that every operations will be operated with
respect to the WHS standards. They demand the work to be completed within 8AM to 6PM
Monday to Friday. The equipments are placed in the special computer room which is located in
the basement of the head office. To achieve the out of hour’s access I need to contact the
Facilities manager, Mr. Jones three days before the operation. Thus, for this reason a report is to
be sent to Mr. Jones such that I can access the out of hours facility. Then, Mr. Jones will deliver
a written report to me which will describe the starting time of my operations, the duration
between which I can stay in the building, and the number of persons allowed for the operation.
Review the existing network design
The organization contain some documentation which describe the current status of the
existing network of the company. The current network of the company is appropriate as the main
switch or the Ethernet port is there in which any appliance can be connected and operated
through it. Thus, we can connect an apparatus in the Ethernet port at any time. It support the
bandwidth of 30Mbps among the two locations.
Equipment required to meet the technical requirements
DEF prefer to use Cisco product which are to be connected in the cisco based switched
network. It should have IPSec base VPN connection to the remote site as well as this should be
connected by the Ethernet port itself. Thus, it is recommended to utilize the Cisco SF300-48PP
based switched network in DEF as it contains layer three functionalities. The specification are as
follows:
Document Page
5DATABASE DESIGNING
Feature Cisco SF300-48PP
Number of Ports 48 x 10/100 (PoE) + 2 x combo Gigabit SFP + 2 x 10/100/1000
Switch fabric Capacity 17.6 Gbps
Jumbo Frame Support Up to 9K (9216) bytes
Bandwidths 30Mbps
Speed of the Ports 10/100, Gigabit SFP and 10/100/1000
Installing the WAN elements
The WAN connection will be implemented outside the business hours of 8AM to 6PM
Monday to Friday which will ensure that the user will not get interrupted for our operations in
the network layer. In case if the access is needed during the business hours then we should
contact Mr. Jones three days prior of the information by delivering an email. The WAN
connection composed of various questions like the connecting branches that will be connected
through Wan are located locally or not, who will give the full access to the connections. To find
the traffic requirement a person should consider the type of the traffic that are supported like
data, video or VoIP and so on. This requires to find the bandwidth capacity of the WAN
connection to the respective ISP.
The following are the questions which should asked prior the implementation of the WAN links\
Will the organization connect the branches that are located locally or not?
Will the WAN gives full or limited access to the authorized clients?
What type of traffic is supported?
The volume of the traffic should also be determined?
Document Page
6DATABASE DESIGNING
Availability of Requirement:
The required equipments are available in various websites. The best is the Cisco product.
The following is the website of the Cisco from where all required equipments can be
accumulated.
https://www.cisco.com/c/en/us/support/switches/sf300-48pp-48-port-10-100-poe-plus-managed-
switchgig-uplinks/model.html
Develop a plan consisting of contingency arrangements and prioritized
operations
This is a plan for Local Melbourne Organization which depicts the connection of switch
and computer. The switch are linked from one site to another and the computers are connected
with each other.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7DATABASE DESIGNING
The impact of proposed implementation on existing IT environment should be
documented. The issues to investigate contains some factors such as the installation and system
requirements, interoperability and the compatibility among the proposed and the existing
hardware and software.
Operations in the plan address the alterations in the existing IT environment and it also
comprises of details regarding the configuration and specification particularly. It is also
mandatory to approve the details of the environment that is discussed in the plan.
Operations Software Hardware
Installation Storing the respective application or the
program in the appropriate device
Physical connection of the
hardware
Configuration Settings are done according to the task
that will be operated by the software part
of the network
Setting the way how the
hardware will operate.
Testing This operation is undertaken to ensure
that implemented or configured software
or hardware operates as expected
Deployment This operation is undertaken to make the
software and hardware available for the
use in the production environment
Document Page
8DATABASE DESIGNING
Approval of the Plan consisting timing and security
The plan can only be approved by the Head Manager of the Melbourne Company. He
will initially check or test the network design and then he will approve or else discard the plan.
He will check whether the links are according to the WHS. Mr. Smith will review and approve
all the plans as well as recommendations.
Security and Timing
The security factor will be approved the special authorities and the timing clients will
approve or allocate the time for the implementation of the proposed network in the organization.
Purpose of Setting the ACLs on the router
Access Control List or ACL is the general method to control the access or denial of the
services. They act as filters for the network traffic, services, and host access and packet storms.
Maximum appliances consist of the default or standard ACL. ACL limit network traffic is used
to rise the network performance as well as it provides the traffic flow control. They also give
security to the network access by demonstrating the part of the network that can be accessed.
Purpose of the router debug command
Cisco IOS Show commands define huge things related to the condition of the router or
the switch. For example the Show commands cannot display the time when the router gets in or
out from the routing table, the reason of SDN failure, Whether packet of data was really
transmitted or not, or what ICMP fault code was discovered. Cisco IOS Debug commands has
the ability to display all these criteria. It is important in investigating operating as it provides the
complete procedure of the device operations. For example on off chance a user run debug the ip
Document Page
9DATABASE DESIGNING
rip in that moment it will display the tear directing interchange. There are also many troubleshoot
charges thus it depends on what is to be investigated. They provide real time data dynamically.
Issues related to the installation and solution of WAN links
The following are the problems related to the proper installation of WAN links
Router Configurations: Poor router configuration automatically resist the proper
connectivity. The routing table as well as the default route should be checked in this
case.\
Link Status: The cable should be plugged in and it is also recommended to utilize the user
show interface FastEthernet 0/0.
DNS Issues: This can simulate the network outage. Thus the proper reason should be
identified and thus proper solutions should be implemented to mitigate those issues.
Differences between IPv4 and IPv6:
IPv4 means Inter Protocol version 4. It is the old technology which is used to connect any
device with the web. Whenever one device accesses the web it is assigned with an identical IP
address like 99.48.227.227. It utilizes 32 bits for the internet addresses which means that it
supports 232 addresses which is around 4.29 billion. The IPv6 is the revised 6th edition of the
Internet Protocol. It is same as IPv4 but in this case it gives unique numerical IP addresses which
is needed for the internet enabled apparatus so that they can communicate. However, it uses 128
bit addresses. It supports a better multicast routing operation and provide true QoS (Quality of
Service). It contains a built in privacy as well as authentication support.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10DATABASE DESIGNING
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]