Sydney-Melbourne Network: BN321 Advanced Network Design

Verified

Added on  2025/05/04

|15
|1338
|124
AI Summary
Desklib provides solved assignments and past papers for students.
Document Page
BN321- Advanced Network
Design
1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
Task 1..................................................................................................................................................................... 3
Task 2..................................................................................................................................................................... 5
Reference.............................................................................................................................................................15
2
Document Page
Task 1
The technique that is used for gathering Information is Face-to-Face interview with the Manager.
Some Sample Question that is asked in this interview are: -
Question 1: - How many users will connect in the network and what will the Future Expansion?
Answer: -The current no. users in Sydney and Melbourne are 30 and 20. For Future Expansion, there may be an
increment of approx. 30% approx.
Question 2: - What Security Measure do you need?
Answer: - They want that no department will connect with each other (We use VLAN in this) [1].
Hardware Requirement are listed below: -
Device Type Device Model Interfaces Features Cost(AUD)
Router’s Cisco 2911 RAM:-16GB
No. of USB Ports:-2
NIM=2
PoE=2
Provide Service
like VLAN,Virtual
Private network
and AAA
$ 7,010
Switch 9300-24P-A Cisco
Catalyst
24 Port Gigabit
Ethernet Port with
Twisted Pairs.
Supports
Network
Technology like
100 Base-T and
1000 Base-T
$5,700
Networking Cable Cat5E Ethernet
Cable
3-5 Bundles $500
Client-Driven Structure
The client-driven structure guarantees the end client's needs and constraints are given the most extreme
significance in all phases of the system configuration process. The system configuration is made in such a way
3
Document Page
the clients are offered adaptability to get to the system with no specialized languages. The client-driven plan is
principally centred on reconciliation of underneath angles [2].
Figure Client-Driven Structure of the project.
4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Task 2
Network Diagram and Topology: -
Cisco Packet Tracer is used to design the network. This design consists of two networks Sydney and Melbourne
which are connected with each other. Sydney network consists of 4 Departments namely as Customer Service,
IT, HR, Accounting. Melbourne network includes 2 Department namely as Customer Service, IT. Further in this
Network Design Subletting is used to divide the network and Security Protocols like VLAN and port-security is
used to provide device-level security to the network.
VLAN
VLAN’s means “Virtual Local Area Network” which is used to create some custom LAN’s from existing Local
Area Network. It also helps to collaborate multiple networks which is situated in different networks to work as
logically a single network. The output of Virtual LAN can be used as the administration of Physical Network.
To Configure or deployment of VLAN’s it is necessary that networking device like router and switches should
support feature of VLAN.VLAN is assigned typically on the switch ports individually or maybe in groups to a
certain VLAN.
Protocols of VLAN
In network traffic flows from multiple networks, so it is necessary to ensure that the information should be
mapped with a specific network. This can be achieved using some VLAN protocols like IEEE 802.1Q, VLT 3Coms
etc. IEEE 802.1Q is generally used by modern VLAN’s as it put the header in every Ethernet Frame. These
header helps VLAN to identify from where the packet is sent and ensure that packet will not move outside the
VLAN network. When Data is sent from one switch to another switch, VLAN uses Trunking protocol for
communication. It is necessary that Trunking should be enabled on switches to communicating. With the help
of 802.1Q protocol is easy to create up to 4904 VLAN’s in a network.
5
Document Page
Without virtual LAN’s, an information packet sent from host A would achieve all gadgets on the system. By
putting port “Fa0/0 and Fa0/1” on different switches s into a different VLAN, a communicate from one host to
another host , since each VLAN is a different communicated area and just host B is inside the equivalent VLAN
as host A. Has in VLAN 3 and VLAN 5 won't know that the correspondence occurred. This appears in the image
beneath:
6
Document Page
Access and trunk ports
Each port on a switch can be designed as either get to or a trunk port. An entrance port is a port that can be
doled out to a solitary VLAN. This kind of interface is arranged on switch ports that are associated with gadgets
with a typical system card, for instance, a host on a system. A trunk interface is an interface that is associated
with another switch. This sort of interface can convey traffic of different VLANs.
In the model system presented over, the connection somewhere in the range of SW1 and SW2 would be
designed as a trunk interface. All other change ports interface with end client gadgets, so they would be
designed as access ports.
Port Security
The switches have a great feature which makes the network secure by protecting it from unknown devices
from packet forwarding. When an unknown device tries to attach itself from the one of the interfaces where
the port security is applied, it blocked the current interface.
Benefits of Port Security: -
Port Security provides a facility to limit the number of MAC address on an interface. When the packet
is sent from the interface it matches the given MAC-Address and if it matches it forward the packet
else drop the packet and block the port.
Port Security uses two methods to filter the traffic which is dynamic locking and Static locking.
Dynamic Locking: - With the help of this method it is easy to specify how many numbers of MAC
Addresses can be used on this port. These numbers are independent of the platform.
It also provides a feature to convert dynamic locking to static locking [3].
Static Locking: - With the help of this method, you can enter the MAC address manually in the list of
the interface.
7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
In this Network Design, We Have Used Star Topology.
The IP address used in this Network including subnet mask.
Sydney Area: -
IP Range: -192.168.1.0/26
No of Users in the Network =64
Device Security: -VLAN and Port Security
Melbourne Area: -
IP Range: - 192.168.1.64/27
No of Users in the Network =32
Device Security: - VLAN and Port Security
Between Sydney and Melbourne
IP Range: -30.30.30.30/30
Routing Protocol: -Static Routing Protocol
Technical Aspects:-
8
Document Page
Devices that are used in this network are Routers and Switches.
Router is Network devices that are used to provide a route for the packet from one network to another.
Switch is a network device that is used within a network to connect every end device with each other.
Table 1: Technicalities of Network Devices [2]
Cost The cost of the switch depends on the number of features is used in the device. Some
feature is listed below.
Port density This feature describes a number of ports available on the switch for connectivity.
Port speed Transmission of a packet from one end to another
Forwarding
rate
Forwarding rate means how many packets can be transmitted in the windows in one second.
PoE support Power over Ethernet (PoE) is utilized to power passageways, IP telephones, surveillance
cameras, and even conservative switches. Interest for PoE is expanding.
Redundant
power
Some stackable and secluded case based switches bolster repetitive power supplies.
Reliability Switches ought to give nonstop access to the system. Hence, select switches with
dependable repetitive highlights including excess power supplies, fans, and boss motors.
Scalability The quantity of clients on a system regularly develops after some time. Along these lines,
select switches that give the chance to develop.
9
Document Page
Basic Configuration:-
10
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
11
Document Page
12
chevron_up_icon
1 out of 15
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]