Local Area Network Design and Setup for E-commerce

Verified

Added on  2025/05/02

|11
|1844
|308
AI Summary
Desklib provides solved assignments and past papers to help students succeed.
Document Page
MAN621
Advanced Network Design
Local Area Network Design and Setup
Student Name:
Student ID:
Contents
Project Scope..........................................................................................................................................................2
Project Hardware Requirements............................................................................................................................2
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Network diagram....................................................................................................................................................4
Network design......................................................................................................................................................4
Network device configuration commands..............................................................................................................6
Demonstration.......................................................................................................................................................7
References............................................................................................................................................................10
List of Figures
Figure 1: Network Diagram....................................................................................................................................4
Figure 2: Ping request.............................................................................................................................................8
Figure 3: PC to Reception Ping................................................................................................................................9
1
Document Page
Project Scope
An e-commerce business organization is planning to setup a new network as its expansion is done. The
company has two small business companies which now will be merged and operation at the same place. Thus
the e-commerce company requires a new LAN setup along with its proposal and implementation at the same
time before the new big company become operational.
Project Hardware Requirements
Each of the devices mentioned below is installed to meet a special requirement in the network devices fulfils a
specific role in a network. Hence they are configured by the network engineers [1].
Network Switch
These days a switch is generally used instead of Hub or Bridge. The procedural working of a Switch and bridge
are somewhat similar. A Bridge and switch learn about MAC address when the devices are connected to each
interface. Switches have more ports than bridges. If configured smartly, using switch can effectively speed up
network performance. Switch is programmed to check the destination MAC address before it is forwarded to
its specified target. It holds detail about MAC address and the port associated with that respective port into a
table.
Routers
A router usually joins different networks together. Routers perform their operations at Layer 3 of OSI model.
Routers are even used to connect the LAN from internet and it also provides some other services like DHCP and
DNS.
The function of a router is to carry forward any packet which belongs either to a same or a different network. It
holds the details regarding different network such as their IP address, next hop address and hops counts in its
routing table. Routes for the networks are configured in two ways; static or dynamic. Static routing deals with
configuring routes manually one by one whereas in dynamic routing routes are learnt in a dynamic way. After
receiving routes information, routers setup their routing tables or records [2].
A router processes a received packet by first looking at the destination IP address from the packet header and
then it compares that address with its routing table and then accordingly forward this packet to its destination.
Routers ensure that the path which is selected for the packet transmission is smallest and best. Some other
names given to the router in a network could be Edge router (If a router is placed at edge; edge means
2
Document Page
connecting the inside and outside network mainly to internet), core router (Placed at core layer), or sometimes
Gateway router.
Physical Media
Twisted pair cable: The data in a network travel via any physical medium to connect two different nodes
together. There is a different kind of media types used in computer networking. Twisted pair cables are formed
using insulated copper wires that are warped around each other to reduce noise from other wires. Plastic is an
ideal non-conductive material which is often used for making insulators.
Coaxial cable: A coaxial cable consists a hard wire in between of its core. This core is then coated with a
nonconductive material layer, then protected with a hard solid metallic protective cover, and covered with an
outer insulator [3].
Cat 5 Wiring Scheme
One of the cables that are used widely is known as EIA/TIA-568 or Commercial Building Telecommunications
Cabling Standard. EIA and TIA are cable standards defined for telecommunication and networking. Cat 5 cables
are formed using EIA/TIA-568 wiring scheme. These comprise of differently coloured wires. Purposely two
pairs from four pairs (made of a conductive material) are used for sending and receiving.
Straight-through cable: The both ends of a Cat 5 cable has same wiring or colour code. Both cables ends follow
either 568A or 568B. We can check a CAT 5 cable if it is a straight-through cable by placing the two ends
(connectors) side by side and verifying the order of the colors. The same colour code at both the ends signifies
that it is a straight-through cable. Straight-through cable usually connects up to two different devices like
computer to a hub or a switch, Switch to router etc.
Crossover cable: Both of the point or ends of a crossover cable have, unlike colour code. It is 568A at one side
and 568B on the other side or vice-versa. We can check a CAT 5 cable if it is a crossover cable by placing the
two ends (connectors) side by side and verifying the order of the colors. The different colour code at both the
ends signifies that it is a crossover cable. A crossover cable usually connects up to two same devices like
computer to a computer, Switch-Switch, Router-router.
RJ-45 connectors: A Cat 5 cable is combined with or ends with RJ-45 connectors to attach these cables to the
NIC of devices. RJ-45 connector has 8 pins. When we are transmitting or receiving data, pins 1, 2, 3, and 6 are
used and while remaining pins which are 4, 5, 7, and 8 don’t do anything [4].
3
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Network diagram
Figure 1: Network Diagram
Network design
The current network design is made in the simulator Cisco Packet Tracer (Student version 6.2.0.xx). It exactly
describes how the PC’s and other nodes will be connected to the switch and router.
Cisco packet tracer has Switch 2911 series which has 24-fast Ethernet ports. So for designing at this simulator
level, we used two switches. Otherwise, we have more options for selecting the switch series. Some of the
Cisco switches have 48 ports. So depending on the number of switch ports the switch will be selected while
actually deploying the network.
As there is no mentioned requirement for anti-inter department communication, we have put every device in
VLAN1 only. Because every device will be able to communicate with each other.
Switch ports are configured with the functionality of Port security. Port-security allows us to prevent
unauthorized users from entering into our network. We bind some PC using their MAC addresses so that only
they become authorized to use the network resources.
Router has been connected to provide access to internet or outside networks. For now, it will also act as DHCP
server which will provide IP addresses to the PCs and other IP enabled devices.
4
Document Page
Then the main components which are PCs are placed for every floor according to the requirements of the
company. However, during simulator practice, the exact no of PCs are not placed, but the number of total
endpoints which are required at every floor is matched while designing an IP address scheme.
Total no of endpoints required = 2 *(total no of PC as mentioned= 168)
= 2*168
=336 (As mentioned that we require 2 endpoints at every desk)
So we have taken 350 endpoints considering future needs.
IP address taken is 172.16.0.0/23, Subnet mask= 255.255.252.0
Total valid hosts IP address available=510
The PCs are configured DHCP IP address allocation mode means PCs will receive their IP Address and default
gateway information from DHCP server configured at Router.
5
Document Page
Network device configuration commands
The network device configuration is shown below. We have mentioned every command which Is needed to
create the topology diagram in our simulator Cisco Packet tracer and this is the same way in which we can
configure the devices in real life also. Command for every device is mentioned below one by one. We will start
with router first and then configure switch and PCs respectively.
Configuring Router
Router
Get to Global configuration mode for setting up IP address for the router’s port.
R1>enable
R1# configure terminal
R1( config)#
Now we can set the IP address
R1(config)# int fa0/0
R1(config-if)# ip address 172.16.0.1 255.255.252.0
R1(config-if)# no shut
IP address is mentioned with subnet mask while setting up IP address.
Configuring the DHCP server on router
For this, we simply have to generate a DHCP pool on router and then it will start to assign the IP Addresses to
the DHCP clients.
R1( config)# ip dhcp pool COMPANY_IP
network 172.16.0.0 255.255.254.0
default-router 172.16.0.1
Switch
Configuring the Port-security on switch ports
Switch (config )# interface range FastEthernet0/1-24
6
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Switch (config-if )# switchport mode access
Switch (config-if )# switchport port-security
Switch (config-if )# switchport port-security maximum 3
Switch (config-if )# switchport port-security mac-address sticky
Switch (config-if )# switchport port-security violation restrict
PC
The task of setting up IP address for every PC is not so handy also it’s a more time taking task. So we will set the
PC to accept IP addresses dynamically from DHCP server configured on Router. PCs will send DHCP request to
DHCP server and the DHCP server will respond back to them with a unique IP address form the Pool configured
on it.
Steps to set DHCP mode for IP address on Simulator:
Simply set the PC to accept the IP address dynamically from the DHCP server. In a few microseconds, we will
see that an IP address is successfully assigned to the PC.
Demonstration
For demonstration purpose, we have used same simulator CISCO PACKET TRACER application. It is mostly used
for practice routing, networking, and switching. The working done through this simulator is exactly same how
our devices work in real life. It actually gives us visualization of our activities while deploying our network
architecture. This is a simple technical way to verify the network design before actually deploying it which helps
in committing fewer problems during live deployment.
For demonstration, we just only have to open our file in simulator and then use these steps written below.
After successful implementation of the network devices, we will now verify the connectivity between different
devices of the company.
For this, we will use PING command
PING command sends ICMP (Internet control message protocol) packets for checking the connectivity to
between a source and destination.
A successful PING shows this output [!!!!!]
Whereas an unsuccessful PING shows this output [. . . . ]
7
Document Page
Some of the outputs of simulator are shown below:
PING request from TOP_Office_Pc1
Figure 2: Ping request
8
Document Page
Warehouse PC pinging to Reception PC1
Figure 3: PC to Reception Ping
9
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
References
[1] Zhao, Yang, and Xiwei Dong. "Routing device and signal transmitting method for wireless local area
network." U.S. Patent 9,215,671, issued December 15, 2015.
[2] Mittal, A. and Chen, H.P., Cisco Technology Inc, 2016. Private virtual local area network isolation. U.S.
Patent 9,363,207.
[3] Hakyung, J.U.N.G., Lee, J., Park, J. and Lim, H., Samsung Electronics Co Ltd, 2019. Method and apparatus for
steering traffic between cellular network and wireless local area network (LAN) network in mobile
communication system. U.S. Patent Application 10/264,487.
[4] Udutha, S.C. and Rapeti, M., Cisco Technology Inc, 2015. Preventing leaks among private virtual local area
network ports due to configuration changes in a headless mode. U.S. Patent 8,989,188.
10
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]