ICTNWK507: Network Implementation and Security Practical Assessment

Verified

Added on  2025/04/08

|24
|3456
|347
AI Summary
Desklib provides past papers and solved assignments for students. This document contains a solved practical assignment for ICTNWK507.
Document Page
ICTNWK507
Assessment
Student Name: Amandeep Singh
Student ID:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Contents
Introduction......................................................................................................................................3
Assessment 1...................................................................................................................................4
(Part A) Multiple choice quiz......................................................................................................4
(Part B) Written Question............................................................................................................5
Assessment 2.................................................................................................................................11
ASSESSMENT 3 – LAB...............................................................................................................15
Lab 1..........................................................................................................................................15
Lab 2..........................................................................................................................................17
LAB 3........................................................................................................................................19
Summary........................................................................................................................................23
References......................................................................................................................................24
List of Figures
Figure 1: Network Diagram...........................................................................................................15
Figure 2: IP Route Command........................................................................................................16
Figure 3: Successful Connection...................................................................................................17
Figure 4: Securing Network...........................................................................................................17
Figure 5: Securing Console...........................................................................................................18
Figure 6: Show Running-Config...................................................................................................19
Figure 7: RIP Configuration Diagram...........................................................................................20
Figure 8: RIP Configuration..........................................................................................................20
Figure 9: RIP communication Successful......................................................................................21
Figure 10: IP route.........................................................................................................................22
Document Page
Introduction
We are going for the different assessment which includes some of the basic questions in
assessment 1 and we will discuss upon the given case study where we have to find out the best
solution for the problems which all are facing by the organization. In assessment 3 we are going
to implement 3 network architecture for the given scenario.
Document Page
Assessment 1
(Part A) Multiple choice quiz
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
(Part B) Written Question
1.
I. Redundant Path: It is the patch other than the primary path which has been configured
for the redundancy of the network. If the primary path gets affected by any of the issues
then the secondary path will help to continue the communication in the network. If taking
an example if there is a network where the computers are connected to the switch and the
switch is connected to the router. If there will be any effect in between any of the primary
path in between this network, then the secondary path or known as the redundant path
will not let this interrupt the network as it will continue the communication with the
secondary path.
II. Path selection: The path selection defines the best path for the packet to travel into the
network. As the travel means that the packet takes which path to reach from the source to
the destination. There are many paths through which the packet can reach to their
destination but the patch selection defines the best path to the packet so that it will not
take longer time reaching to their destination (TechTarget, 2019).
III. Static Routing: It is a type of Interior gateway in term of the routing protocol. Which is
being configured so that there will be communication in between the two different
networks. This static configuration is needed to be done in the different routers whatever
routers are there which are interconnected to each other. The command which is used for
the static routing is IP route network address of different connected network with a
subnet mask of that network with the address of the interior router interface (Masucci,
2016).
2.
The two-physical way for providing the security to the routers are:
I. Controlling the access to the router: The best way to secure the router physically is by
limiting the access to it. The less the access to the router is the more secure the router is.
It is more dangerous when the access is with many other. The configuration can be
changed or maybe that can lead to the down of the network.
Document Page
II. Monitoring: It must need =ed to monitor the site so that any of the misuse or any theft or
any of the disrupt can be monitored and can help get rid of the network down (Masucci,
2016).
3.
The three things which are needed for the updating of the code on the given or specific router
are:
I. ISO image must be copied to the router
II. Must check for the ISO image in the given file system.
III. Need to verify the register configuration.
4.
The two benefits of enabling logging on the router are:
I. Securing unauthorized access to the router.
II. Securing from the console access
5.
The private IP address range which is reserved in IPv4 are:
I. 10.0.0.0 – 10.255.255.255
II. 172.16.0.0 – 172.31.255.255
III. 192.168.0.0 – 192.168.255.255
6.
I. The advantage for the dynamic routing in comparing with static routing is that the routes
in the static routing are defined by the user itself while in the dynamic routing the route
of the network packets is dynamically updated. There is no need to define by a manual.
II. The disadvantage of dynamic routing in comparing with static routing is that static
routing is more secure in comparing with dynamic because dynamic routing used to send
multicast as well as broadcast time to time to update the table.
7.
Document Page
An Autonomous System is basically the router policy unit which can be in the network grouped
together or in a single network. It is also known as in other term routing domain. It is a number
which is assigned globally. Which is known as ASN where A is for Autonomous, S for System,
and N is for Number (Krzyzanowski, 2016).
8.
I. BGP which stands for Border for B, Gateway for G, and Protocol for P.
II. OSPF which stands for Open for O, Shortest for S, Path for P, and First for F.
III. RIP Which stands for Routing for R, Information for me, and Protocol for P.
9.
Classless Routing Classful Routing
Subnet mask s carried while updating The subnet mask is not carried.
Different subnets for the router interface
which can be for the same network.
There is no different subnet for the router
interface.
VLSM is supported VLSM is not supported
Examples: RIP v2, OSPF Examples: RIP v1, IGRP
10.
The three metrics kinds which are used by the protocol like EIGRP for selecting the path which
best suite that protocol. These are:
I. Feasible Successor: It is a given path where the distance of Reported id less while
comparing it with a distance of feasible.
II. Feasible Distance: It is one of the best metrics for reaching the packet to its destination
from the source.
III. Reported Distance: It is termed as total metrics for the destination network.
11.
If there is an error generated in the network or if we need to find out the information related to
the operation of all the devices, then the command debug is used. It is the best troubleshooting
tool which is used only for a limited period of time.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
The user only requests for this command as when they want to know the information related to
the receiving the messages of ICMP or information related to EIGRP, etc.
The command of debugging utilizes the maximum resources of the CPU which can be more
dangerous for the environment like production.
The commands for debugging the packets like ICMP is:
R1# debug ip rip
12.
The single reason that we must take the precaution while using the command of debugging is:
i. This command like debugging can lead to disrupting the router’s operation at the time
of high load on the internetworking Cisco. (2014).
13.
The Ports which has been used for displaying the output of debugging are:
i. Console Port: The output of the debug will be displayed on the console port if you are
connected to the console port. There is no need for extra work to get done for this.
For this, we need to make sure that the level is set to desire for the logging console.
ii. VTY Port: While connected via telnet or from the port of auxiliary we need to give
the command terminal monitor and will also need to verify the command is not set for
no logging.
iii. AUX Port: It will not display the output of the boot sequence. We just need to make
sure first that the command no logging has been set. It has to be disabled for the
displaying of the output of the debug from the aux port.
14.
The command which is being used for stopping the debug is undebug all or the other command
is no debug all. These commands will stop the working of the debug. We can also check that the
debug is being set off or not by giving the command in the terminal as show debug. This will
display the status of the debug command.
Document Page
As we cannot use this command for the continuous period so we need to stop it also because it
utilizes the maximum resources of the available CPU in the given environment that can be
dangerous for the production environment (Wilkins, 2011).
15.
Traceroute is the basic feature which helps us to display the packets which all are leaving and
entering from some individual interface. Whenever we need to find out the generate the
messages regarding the packets which all are leaving and entering the individual interface, then
the command traceroute will help us to find this out.
16.
The broadcast address for the cutwork of class C which is 192.168.5.0/24 is 192.68.5.255. The
last address of the network is termed as the broadcast address. This network has the 254 hosts.
17.
The two basics protocols that are used to operate on Transport Layer which is for the best suite
of TCP/IP are:
i. UDP: UDP stands for User for U, Datagram for D, and Protocol for P.
ii. TCP: TCP stands for Transmission for T, Control for C, and Protocol for P.
18.
The two basics protocols that are used to operate on Application Layer which is for the best suite
of TCP/IP are:
i. NFS: IT is a kind of file service which is available on the Application Layer.
ii. DNS: it is basically used for the conversion of the name to the IP and the conversion
of the IP to the name which is used for the understanding of the users and the
systems.
19.
The command which is used in the CLI mode to go to the privileged mode is
Enable.
Document Page
This will take the user to the privileged mode from the user execution mode.
20.
The command which is used in the CLI mode of the router to reboot it is
R1# reload
This will be used to reload the operating system as well as reboot the router (Lykins, 2013).
21.
i. Whenever we first start the configuration on the router in its CLI mode, then the first
thing which it prompts is a > symbol. This symbol means that the user in the mode of
execution. It can be used to just checking the version of the running IOS in the
device. It can also be helpful for checking the resources of the memory.
ii. After the execution mode of the user, the mode which comes after giving the
command enables in the execution mode we go to the privileged mode. The prompt
which comes in the privileged mode is like “Router#”. This simply notifies us that we
are in the privileged mode. We can configure the router in this given mode. We can
also implement security for securing the router as well as we can enable the interfaces
available in the router.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Assessment 2
1.
There is some relevant legislation that needs to be applied while installing WAN connectivity
are:
I. We need to prepare first which we need to install the medium for the enterprise
connectivity of WAN.
II. After that, we need to configure the WAN.
III. Then we need to check the connectivity and verify the services of the internet protocols
on the given router.
IV. We also need to secure the network.
V. Lastly, we need to troubleshoot the devices which are connected for the WAN
connectivity.
2.
According to the procedure of the DEF, the following things need to be in mind:
I. We need to take router 4221 which is of the series of 4000.
II. It supports RIP as well as OSPF.
III. It also suitable for the security purpose which is that it supports VPN connection based
on IP-Sec.
All the requirement for the DEF organization is fulfilled and there can be a chance in the router
as per the requirement.
3.
The given design of the network is not so correct. As they need to provide one multi-port switch
which will be used to connect to the router and the other switches which all are required. The
router needs to be changed to the series of 4000. The router needs to support VPN based on the
IP-sec. We need to implement security for securing up the network for the administrative access.
We will provide the login password to the router which will be used through the console to get
access to configure further. The IP address the need to be done as the IP address has not been so
Document Page
sure and need to give each of the system or the 150 hosts a private address of IPv4. We are not
going to take a public address for the host.
4.
The required equipment which is needed for implementing the infrastructure of the DEF
organization is given in the below table.
Devices Series Port Amount
Router 4221 8 2
Multiport-Switch 3560 24 1
Switch 2950 24 7
Computers 5559 1 150
These are the following devices which are going to support the requirement of the organization
as per the configuration they required.
5.
The specification for the following devices which are going to be used in the following scenario
is:
Devises Features
Router It supports the VPN based on the IP-sec. It
also follows the routing protocols like OSPF
and RIP, which has been required for the
network implementation.
Multi-port Switch This is used for minimizing the complex
configuration in the design of the network. As
it has been taken in the following network so
that all the VLAN which are needed in the
network can be created in this switch and the
other switch which all are connected to it will
get the information of all the available
VLAN’s.
Switch These are used for connecting the computers
in a network. These are connected through the
straight wire. The switch is used to send the
packets to their destination.
Computer These are the host who all are connected to
the network. All the 150 hosts are connected
to the network through the computers only.
chevron_up_icon
1 out of 24
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]