Network Configuration Report: Design, Implementation, and Testing

Verified

Added on  2022/10/04

|19
|3655
|427
Report
AI Summary
This report details the design and implementation of a network solution for a UK-based company with four departments requiring individual connections and restricted functionality. The solution involves VLANs for each floor and remote systems to isolate traffic and enhance security and cost-effectiveness. The report includes an IP table outlining network addresses and subnet masks for each department, along with logical network designs and configuration details for PCs, routers, VLANs, DNS, mail, and wireless settings. It covers ping tests and descriptions of network components like NICs, switches, and protocols such as routing, DNS, and spanning tree. The report discusses network design principles, including the use of a star topology and LAN characteristics, and concludes with references to relevant literature. The solution utilizes Cisco Packet Tracer for network design and analysis, ensuring scalability, redundancy, performance, security, and practicality. The report also covers subnetting, wireless configurations, and various network protocols.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: NETWORK CONFIGURATION
Network configuration
Name of the Student
Name of the university
Author note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
Introduction.................................................................................................................................................3
IP Table........................................................................................................................................................3
Network design...........................................................................................................................................4
Configuration...............................................................................................................................................6
PCS Configuration....................................................................................................................................6
Router configuration...............................................................................................................................7
VLAN Configuration.................................................................................................................................7
DNS Configuration.................................................................................................................................10
Mail configuration.................................................................................................................................11
Wireless configuration...........................................................................................................................11
Ping Test....................................................................................................................................................12
Description................................................................................................................................................13
Network Interface Card (NIC)....................................................................................................................14
Switch........................................................................................................................................................14
Layer 1...................................................................................................................................................14
Layer 2...................................................................................................................................................15
Layer 3...................................................................................................................................................15
Subnetting.................................................................................................................................................15
Wireless.....................................................................................................................................................16
Network protocols used............................................................................................................................16
Routing..................................................................................................................................................16
Domain name system............................................................................................................................16
Spanning Tree protocol.........................................................................................................................17
Hot standby router protocol..................................................................................................................17
File transfer protocol.............................................................................................................................17
Simple mail transfer protocol................................................................................................................17
Conclusion.................................................................................................................................................17
References.................................................................................................................................................18
Document Page
Document Page
Introduction
This paper is associated with the developing a network solution for a Uk based company. They had four
departments which needs individual connection and restricted functionality in order to avoid interaction
with other departments.
VLANs are made over each floor and for remote systems. This is to expel the uncontrolled
communicated traffic arriving at another system. VLAN likewise gives a layer of system security and cost
decrease alternative by sensibly isolating hosts which is associated with a similar switch (no requirement
for extra switches).
IP Table
Departmen
t
Neede
d
Allocate
d
Network
Address
Networ
k
Notatio
n
Range Broadcast Subnet
Mask
1 49 62 192.168.168.12
8
/26 192.168.168.12
9
192.168.168.19
0
192.168.168.19
1
255.255.255.19
2
2 19 30 192.168.168.19
2
/27 192.168.168.19
3
192.168.168.22
2
192.168.168.22
3
255.255.255.22
4
3 12 14 192.168.168.22
4
/28 192.168.168.22
5
192.168.168.23
8
192.168.168.23
9
255.255.255.24
0
4 69 126 192.168.168.0 /25 192.168.168.1
192.168.168.12
6
192.168.168.12
7
255.255.255.12
8
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Network design
Figure 1: Logical network design
Document Page
Figure 2: Advanced Logical network design
Document Page
Configuration
PCS Configuration
Figure 3: configuring IP address and default gateway
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Router configuration
Figure 4: Router Configuration
VLAN Configuration
Document Page
Figure 5: Creating four Vlans in the layer switch
Figure 6: Activated VLANs
Document Page
Figure 7: Creating four Vlans in the layer 2 switch
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
DNS Configuration
Document Page
Mail configuration
Wireless configuration
Document Page
Ping Test
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Figure: ping pc within same department
Figure: ping pc of different department
Description
To make the network plan, four switches of layer two model 2960 were embedded to make
neighborhood and interconnect PCs on a VLAN, for the four offices, since they are put in various areas
and, dependent on the necessities, every division switch will have the quantity of mentioned gadgets
after the subnetting setup of the subnets will be performed. One layer two switch, arranged as a trunk
on the private network, will have the four database servers for every office VLAN. Also, one open layer
two switch for the open server will have the organization's email, web and DNS servers. Along these
lines, two layers three switches of the model were embedded for network pulling, likewise, for excess
and adaptability (figure One switch was embedded for establishing among VLANs and for
interconnection with the DMZ.
Continuing with the above situation, a starter examination concerning the network configuration was
completed and, for structuring and analyzing the network usefulness, Packet Tracer was utilized. To
make a little network for "alM.UK", a star changed various leveled network topology was utilized,
additionally also called crumbled model due to the accompanying reasons: versatility, repetition,
Document Page
execution, security, sensibility, practicality. As per Cahn (2008) each network configuration has three
attributes: execution, cost and unwavering quality, which none are simple to evaluate. The Network
representation configuration is the key for the not well characterized issue.
Additionally, settling on such network structure one sort of network was considered: LAN.
Neighborhood is a correspondence framework frequently constrained by a single association that is
utilized for transmission between comparable or disparate advanced gadgets. In addition, the LAN
transmission range can get from 1 bit to 1 million bits for each second. LANs will suit the networks that
will fit in the accompanying qualities: short separations between 1 to 10 km, anticipating minimal effort,
low blunder rate, high dependability, simple to access and rapid. As per IEEE 4, neighborhood is
separated from different kinds of information networks and is utilized to give correspondence to a
decently little region, for example, distribution center or a solitary constructing, and is depending on
physical correspondence channel which is dependably low blunder rate. On the other hand, expressed
that LAN has showed up therefore from consolidating two unique innovations which are media
transmission and PCs. This had the result of bringing forth minicomputers, work stations, ease PCs and
insightful terminals.
Network Interface Card (NIC)
A NIC (articulated 'scratch') is otherwise called a network card. It associates the PC to the cabling, which
thus interfaces the majority of the PCs on the network together. Every PC on a network must have a
network card. Most present-day network cards are 10/100 NICs and can work at either 10Mbps or
100Mbps. Just NICs supporting at least 100Mbps ought to be utilized in new establishments
understudies. PCs with a remote association with a network likewise utilize a network card (Ana, Yehuda
and Shemer 2003) .A center point is a gadget used to associate a PC to the network. The capacity of a
center is to coordinate data around the network, encouraging correspondence between every
associated gadget (Kristianto et al. 2014). Anyway, in new establishments switches ought to be utilized
rather than centers as they are increasingly successful and give better execution. A switch is regularly
named a 'brilliant center'. Switches and centers are innovations or 'boxes' to which PCs, printers, also,
other networking gadgets are associated. Switches are the later innovation and the acknowledged
method for structure the present networks. With switching, every association gets "devoted data
transfer capacity" and can work at full speed. Conversely, a center point shares data transmission over
numerous associations with the end goal that movement from one PC or server can hinder the
successful speed of different associations on the center.
Switch
Present day business switches use fundamentally Ethernet interfaces. The inside limit of an Ethernet
switch is to give a multiport layer 2 spreading over limit. Various switches perform errands at various
layers. A device ready to accomplish more than spreading over is known as a multilayer switch. Switches
may get some answers concerning topologies at various layers and forward at any rate one layers.
Layer 1
A layer 1 network contraption moves data, yet does not manage any of the traffic coming through it.
Any packet entering a port is repeated to the yield of one another port beside the port of section.
Specifically, each piece or picture is reiterated as it streams in (Bing, Bloemhof and van 2014). A repeater
focus can as needs be simply get and advance at a singular speed. Since every packet is reiterated on
Document Page
one another port, packet accidents impact the entire network, compelling its general breaking point. By
the mid-2000s, there was little worth difference between an inside point and a low-end switch. Hubs
remained supportive for a period for explicit applications, such giving a copy of network traffic to a
packet analyzer. A network tap may, in like manner, be used and therefore, many network switches
right now have a port reflecting component that gives a comparative convenience.
Layer 2
Spanning innovation has been around since the 1980s (and possibly prior). Spanning includes division of
neighborhood (LANs) at the Layer 2 level. A multiport connect commonly finds out about the Media
Access Control (MAC) addresses on every one of its ports and straightforwardly passes MAC edges
bound to those ports (González et al. 2016). These scaffolds additionally guarantee that edges bound for
MAC tends to that lie on a similar port as the starting station are not sent to different ports. For this
dialog, we think about just Ethernet LANs.
Layer 2 switches adequately give a similar usefulness. They are like multiport connects in that they learn
and forward edges on each port. The significant contrast is the association of equipment that
guarantees that different switching ways inside the switch can be dynamic simultaneously. For instance,
consider a network, which subtleties a four-port switch with stations A on port 1, B on port 2, C on port
3 and D on port 4. Accept that A wants to speak with B, and C wants to speak with D (Mulder and Dekker
2014). In a solitary CPU connect, this sending would ordinarily be done in programming, where the CPU
would get outlines from every one of the ports consecutively and forward them to suitable yield ports.
This procedure is profoundly wasteful in a situation like the one demonstrated beforehand, where the
traffic among A and B has no connection to the traffic among C and D.
Layer 3
Layer 3 switching is a generally new term, which has been expanded by a various merchant to depict
their items. For instance, one school utilizes this term to portray quick IP steering by means of
equipment, while another school utilizes it to depict Multi-Protocol Over ATM (MPOA). With the end
goal of this talk, Layer 3 switches are superfast defeaters that do Layer 3 sending in equipment.
Subnetting
Subnetting is the technique used to parcel a solitary physical network into more than one littler
intelligent sub-networks (subnets). An IP address incorporates a network fragment and a host section.
Subnets are structured by tolerating bits from the IP address' host part and utilizing these bits to allocate
various littler sub-networks inside the first network. Subnetting enables an association to include sub-
networks without the need to obtain another network number by means of the Internet specialist
organization (ISP). Subnetting decreases the network traffic and disguises network intricacy (Nayeem,
Rahman and Rahman 2014). Subnetting is basic when a solitary network number must be apportioned
over various fragments of a neighborhood (LAN). Subnets were at first intended for settling the lack of IP
addresses over the Internet.
In the beginning times of advancement of the Internet Protocol, the network number was consistently
the most astounding request octet (most huge eight bits) (Landis et al. 2014). Since this strategy took
into account just 256 networks, it before long demonstrated insufficient as extra networks built up that
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
were autonomous of the current networks previously assigned by a network number. In 1981, the
tending to detail was changed with the presentation of classful network architecture.
Classful network configuration considered a bigger number of individual network assignments and fine-
grained subnetwork structure. The initial three bits of the hugest octet of an IP address were
characterized as the class of the location. Three classes (A, B, and C) were characterized for general
unicast tending to. Contingent upon the class inferred, the network recognizable proof depended on
octet limit fragments of the whole location. Each class utilized progressively extra octets in the network
identifier, in this way diminishing the conceivable number of hosts in the higher request classes (B and
C). The accompanying table gives a review of this now old framework.
Wireless
A wired network uses links to interface gadgets, for example, workstation or PCs, to the Internet or
another network. A remote network enables gadgets to remain associated with the network however
wander untethered to any wires (Rhu et al. 2016). Passages enhance Wi-Fi signals, so a gadget can be a
long way from a switch yet at the same time be associated with the network.
A wired network has a few detriments when contrasted with a remote network. The greatest weakness
is that your gadget is fastened to a switch. The most widely recognized wired networks use links
associated toward one side to an Ethernet port on the network switch and at the opposite end to a PC
or other gadget.
Beforehand it was believed that wired networks were quicker and more secure than remote networks.
Be that as it may, ceaseless upgrades to remote network innovation and Wi-Fi networking models have
dissolved speed and security contrasts among wired and remote networks.
Network protocols used
Routing
Static Routing – Static courses are designed on portal/center switches of every branch and in principle
site, to course the traffic from inside system to another branch organize. As the following bounce (IP of
each branch arrange) is realized this can be utilized. Since this is a little system, utilizing static courses
are straightforward and simple (Alshamsi and Diabat 2015). It's safe on the grounds that no any steering
commercials are traded among neighbors and registering assets are monitored in light of the fact that
no directing calculation or update components are required.
Default steering – This is arranged on center switches to course the traffic from inside system to ISP
switch for obscure traffic (towards web).
Entomb VLAN directing – Core switches are designed to course the traffic between various VLANs in the
system. The traffic will arrive at the switches from center switch, which are associated by trunk (Liu and
Wang 2015). All VLAN systems will be appeared as straightforwardly associated courses in steering table
(sub interfaces are utilized).
Document Page
Domain name system
DNS is arranged in DNS server, which is in the DMZ. Every one of the hosts in this system are thought to
be associated with area. In this way, every host (workstations) have their novel area name. Along these
lines, inside clients can utilize the particular space name to associate with each host remotely. However,
PCs can't comprehend the name. It ought to be changed over to numbers called IP address. Along these
lines, DNS server keep up the guide of area name of each host to its relating IP address. Therefore, the
board and multifaceted nature of system can be decreased (Duan et al. 2014).
Spanning Tree protocol
The repetitive connection association is given between the switches in each floor to the center switch.
The reason for having an additional connection is that, in the event that one connection goes down, the
system segments can still speak with each other utilizing the repetitive connection (Farahani et al. 2014).
Along these lines, there will be less downtime in the system. In any case, there is a worry of including an
additional connection between system switches because it will make a communicate storm (circle). To
maintain a strategic distance from this issue, STP convention is utilized within switches in this system. In
this way, one dynamic connection will be available at once and another connection will be in blocked
mode (Talaei et al. 2016). When the dynamic connection falls flat, the repetitive connection come into
dynamic mode from blocked mode.
Hot standby router protocol
HSRP is arranged by consolidating the two center switches in this system. Thusly the two center switches
will go about as a solitary virtual switch for the inward has. First center switch will accept the
accountability as dynamic switch, while the other will accept obligation as reserve switch. On the off
chance that dynamic switch falls flat, the backup switch expects the job of the dynamic switch
(Eskandarpour et al. 2016). Since the new sending switch utilizes a similar MAC and IP addresses, the
hosts can convey with no interruption.
File transfer protocol
This is utilized for the document movement inside the system. The records that should be shared, is
transferred to the FTP server. In this way, the customers can get to the common records utilizing a
particular program called FTP customer (Demuth et al. 2014). The primary motivations to utilize FTP is to
incorporate the information that can be moved in mass productively and permits to move numerous
records as well as various indexes at one time.
Simple mail transfer protocol
SMTP servers are increasingly solid when sending information to customers. They convey mail to
beneficiaries rapidly, they offer unwavering quality in sending email messages (SMTP server will
consistently attempt to re-send a similar email until the transmission winds up fruitful), spam messages
can be controlled in the focal area and post box limit is constrained to equipment limit (Soleimani,
Seyyed-Esfahani and Kannan 2014).
Conclusion
The network configuration actualized above meets the necessities by the organization ALM UK. More IP
locations were allotted for the organization to be capable add more gadgets to each office for future
advancement. Rather than the DMZ could be utilized a Firewall that too a controls clients of getting to
Document Page
different offices, moving documents on web, yet DMZ offers a larger amount of security . Connected
various leveled network arrangement for the network structure improved its versatility, excess,
execution, security, reasonability, viability.-
References
Demuth, H.B., Beale, M.H., De Jess, O. and Hagan, M.T., 2014. Neural network design. Martin Hagan.
Eskandarpour, M., Dejax, P., Miemczyk, J. and Péton, O., 2015. Sustainable supply chain network design:
An optimization-oriented review. Omega, 54, pp.11-32.
Farahani, R.Z., Rezapour, S., Drezner, T. and Fallah, S., 2014. Competitive supply chain network design:
An overview of classifications, models, solution techniques and applications. Omega, 45, pp.92-118.
Duan, S., Hu, X., Dong, Z., Wang, L. and Mazumder, P., 2014. Memristor-based cellular nonlinear/neural
network: design, analysis, and applications. IEEE transactions on neural networks and learning systems,
26(6), pp.1202-1213.
Alshamsi, A. and Diabat, A., 2015. A reverse logistics network design. Journal of Manufacturing Systems,
37, pp.589-598.
Rhu, M., Gimelshein, N., Clemons, J., Zulfiqar, A. and Keckler, S.W., 2016, October. vDNN: Virtualized
deep neural networks for scalable, memory-efficient neural network design. In The 49th Annual
IEEE/ACM International Symposium on Microarchitecture (p. 18). IEEE Press.
Landis, J.R., Williams, D.A., Lucia, M.S., Clauw, D.J., Naliboff, B.D., Robinson, N.A., van Bokhoven, A.,
Sutcliffe, S., Schaeffer, A.J., Rodriguez, L.V. and Mayer, E.A., 2014. The MAPP research network: design,
patient characterization and operations. BMC urology, 14(1), p.58.
Nayeem, M.A., Rahman, M.K. and Rahman, M.S., 2014. Transit network design by genetic algorithm with
elitism. Transportation Research Part C: Emerging Technologies, 46, pp.30-45.
Mulder, J. and Dekker, R., 2014. Methods for strategic liner shipping network design. European Journal
of Operational Research, 235(2), pp.367-377.
González, A.D., Dueñas Osorio, L., Sánchez Silva, M. and Medaglia, A.L., 2016. The interdependent
network design problem for optimal infrastructure system restoration. Computer Aided Civil and
Infrastructure Engineering, 31(5), pp.334-350.
Bing, X., Bloemhof-Ruwaard, J.M. and van der Vorst, J.G., 2014. Sustainable reverse logistics network
design for household plastic waste. Flexible Services and Manufacturing Journal, 26(1-2), pp.119-142.
Soleimani, H., Seyyed-Esfahani, M. and Kannan, G., 2014. Incorporating risk measures in closed-loop
supply chain network design. International Journal of Production Research, 52(6), pp.1843-1867.
Talaei, M., Moghaddam, B.F., Pishvaee, M.S., Bozorgi-Amiri, A. and Gholamnejad, S., 2016. A robust
fuzzy optimization model for carbon-efficient closed-loop supply chain network design problem: a
numerical illustration in electronics industry. Journal of Cleaner Production, 113, pp.662-673.
Liu, H. and Wang, D.Z., 2015. Global optimization method for network design problem with stochastic
user equilibrium. Transportation Research Part B: Methodological, 72, pp.20-39.
chevron_up_icon
1 out of 19
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]