Network Design and Implementation Project: Overview of Internetworking
VerifiedAdded on 2025/06/19
|18
|1249
|390
AI Summary
Desklib provides solved assignments and past papers to help students succeed.

Network requirement analysis and
plan
Unit: Overview of Internetworking
School of Information Technology and Engineering
plan
Unit: Overview of Internetworking
School of Information Technology and Engineering
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Contents
Scope of project..........................................................................................................................................2
Project Requirement...................................................................................................................................2
Network Design...........................................................................................................................................2
IP and Subnet marks Table..........................................................................................................................4
Networking topology diagram.....................................................................................................................5
Internet configuration of system for security purpose................................................................................6
Router information..................................................................................................................................6
Step 1:..................................................................................................................................................6
Step 2:..................................................................................................................................................7
Configuration of switch...........................................................................................................................7
Step 3:..................................................................................................................................................8
Step 4:..................................................................................................................................................8
Step 5:..................................................................................................................................................8
Communication between PC and router.....................................................................................................9
Configure the router..............................................................................................................................10
WI-FI Password security........................................................................................................................12
Configuration of Wi-Fi Access point.......................................................................................................13
Conclusion.................................................................................................................................................16
References.................................................................................................................................................17
1
Scope of project..........................................................................................................................................2
Project Requirement...................................................................................................................................2
Network Design...........................................................................................................................................2
IP and Subnet marks Table..........................................................................................................................4
Networking topology diagram.....................................................................................................................5
Internet configuration of system for security purpose................................................................................6
Router information..................................................................................................................................6
Step 1:..................................................................................................................................................6
Step 2:..................................................................................................................................................7
Configuration of switch...........................................................................................................................7
Step 3:..................................................................................................................................................8
Step 4:..................................................................................................................................................8
Step 5:..................................................................................................................................................8
Communication between PC and router.....................................................................................................9
Configure the router..............................................................................................................................10
WI-FI Password security........................................................................................................................12
Configuration of Wi-Fi Access point.......................................................................................................13
Conclusion.................................................................................................................................................16
References.................................................................................................................................................17
1

Scope of project
In this assignment a networking system is designed which consists of five departments which are
shared their data in such a way that they can communicate with one another to make organization
worth full. Every organization needs a proper system to communicate and manage their work and
this can only achieve with the use of such kind of networking system. This networking system is
simulated and implemented in software called cisco packet tracer. In this software the standard
networking system can be implemented and used in for making official networks. Regarding logical
approach the system is simulated in such a way that every department connected with the secure
fire wall and can able to communicate via router. The main purpose of this report is to develop a
networking system which follows the proper instruction from different department of an
organization.
Project Requirement
To design the networking system there is need for the proper accessories, for instance, in this scenario
we need a PCs from departments , a Wi-Fi to connect the pc with switches, switch, to 5505 ASA0 is
required to make system secure. A system is attached with one pc to configure the fire wall.
Network Design
In the designing, initially the departments are segregated and connected with the fire wall which is 5505
via Wi-Fi module. To set the Wi-Fi module first card is change with wmp 300 N. Then connections are
made and pcs, switches and routers are configured according to given specification.
2
In this assignment a networking system is designed which consists of five departments which are
shared their data in such a way that they can communicate with one another to make organization
worth full. Every organization needs a proper system to communicate and manage their work and
this can only achieve with the use of such kind of networking system. This networking system is
simulated and implemented in software called cisco packet tracer. In this software the standard
networking system can be implemented and used in for making official networks. Regarding logical
approach the system is simulated in such a way that every department connected with the secure
fire wall and can able to communicate via router. The main purpose of this report is to develop a
networking system which follows the proper instruction from different department of an
organization.
Project Requirement
To design the networking system there is need for the proper accessories, for instance, in this scenario
we need a PCs from departments , a Wi-Fi to connect the pc with switches, switch, to 5505 ASA0 is
required to make system secure. A system is attached with one pc to configure the fire wall.
Network Design
In the designing, initially the departments are segregated and connected with the fire wall which is 5505
via Wi-Fi module. To set the Wi-Fi module first card is change with wmp 300 N. Then connections are
made and pcs, switches and routers are configured according to given specification.
2
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Figure 1 Insert the Wi-Fi card to make pc wireless
Select R232 port and console port of ASAO 5505
In the above picture it is shown that the pc are connected wirelessly but the ip address are not
configured because the router is turned into red.
3
Select R232 port and console port of ASAO 5505
In the above picture it is shown that the pc are connected wirelessly but the ip address are not
configured because the router is turned into red.
3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

IP and Subnet marks Table
IP address DHCP IP address in used Subnet marks
169.254.94.107 255.255.0.0
169.254.124.46 255.255.0.0
169.254.74.168 255.255.0.0
169.254.152.139 255.255.0.0
169.254.107.130 255.255.0.0
The subnet is IP network which based on the logical subdivision. Sub netting is the process in
which high order bits are arranged in such a way that create subnet mask. Every device has
his own dedicated subnet marks which work through its gate way. The gate way address is
the main address of the server of router. Every server and router has its own dedicated IP
address which is identifies by the end devices.
4
IP address DHCP IP address in used Subnet marks
169.254.94.107 255.255.0.0
169.254.124.46 255.255.0.0
169.254.74.168 255.255.0.0
169.254.152.139 255.255.0.0
169.254.107.130 255.255.0.0
The subnet is IP network which based on the logical subdivision. Sub netting is the process in
which high order bits are arranged in such a way that create subnet mask. Every device has
his own dedicated subnet marks which work through its gate way. The gate way address is
the main address of the server of router. Every server and router has its own dedicated IP
address which is identifies by the end devices.
4

Figure 2 Creating subnet marks of network
Networking topology diagram
5
Networking topology diagram
5
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Internet configuration of system for security purpose.
To configure the internet at the 5505 ASAO there are some instruction which are very necessary
to follow, for instance, the public ip which is assign publicly to the router and this ip came via
previous ip address called Gate way ip.
Router information
Public=201.1.1.2
GW= 201.1.1.1
Step 1: Assign ip on the cisco ASA and router then set int inside and outside on cisco ASA
6
To configure the internet at the 5505 ASAO there are some instruction which are very necessary
to follow, for instance, the public ip which is assign publicly to the router and this ip came via
previous ip address called Gate way ip.
Router information
Public=201.1.1.2
GW= 201.1.1.1
Step 1: Assign ip on the cisco ASA and router then set int inside and outside on cisco ASA
6
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Open the terminal of that pc which is attached with the Cisco ASA.
In the terminal of this pc write the command to insert the IP of dhcp.
Step 2: Make the vlan between all the attached pcs and get the access of all hosts.
Configuration of switch
In the dynamic routing the switch is configured by enabling the port of switch and the required
commands are mentioned below. Security levels are adjusted in this configuration
Security level 100=inside
Security level 0=outside
Security level 1-99=DMZ (Steinberg et al, 2015).
Configuration of switch
In the dynamic routing switch is configured via ports the commands are mentioned below.
7
In the terminal of this pc write the command to insert the IP of dhcp.
Step 2: Make the vlan between all the attached pcs and get the access of all hosts.
Configuration of switch
In the dynamic routing the switch is configured by enabling the port of switch and the required
commands are mentioned below. Security levels are adjusted in this configuration
Security level 100=inside
Security level 0=outside
Security level 1-99=DMZ (Steinberg et al, 2015).
Configuration of switch
In the dynamic routing switch is configured via ports the commands are mentioned below.
7

Step 3: Provide the IP address and subnet marks of router to create the strong wire wall between the
networks. This router will work at outside boundary of the cisco ASA 5505.
Step 4: create an IP address inside the network and every department will use this IP address to
communicate with the PCs which are attached with switches. The address of dhcpd are used to
configure the device asao 5505.
Step 5: Pc of every department will be use same level of dynamic ip address. There will no static ip.
8
networks. This router will work at outside boundary of the cisco ASA 5505.
Step 4: create an IP address inside the network and every department will use this IP address to
communicate with the PCs which are attached with switches. The address of dhcpd are used to
configure the device asao 5505.
Step 5: Pc of every department will be use same level of dynamic ip address. There will no static ip.
8
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Communication between PC and router.
After configuration of pcs, switches and servers system network is ready to communicate with one
another. To check the communication, the response can be checked by pinging the two pcs.
In the blow command prompt, the address of one pc 172.16.1.1 is pinged with the other finance
department and also getting reply from second department. Similarly, communication of every pcs can
be connected with one another. The ping cammand is working for every device, this command ensure
that the packet of information can be send from one node to another node. After sending the packets
the positive response can be achieved (Wang et al, 2016).
9
After configuration of pcs, switches and servers system network is ready to communicate with one
another. To check the communication, the response can be checked by pinging the two pcs.
In the blow command prompt, the address of one pc 172.16.1.1 is pinged with the other finance
department and also getting reply from second department. Similarly, communication of every pcs can
be connected with one another. The ping cammand is working for every device, this command ensure
that the packet of information can be send from one node to another node. After sending the packets
the positive response can be achieved (Wang et al, 2016).
9
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Configure the router
10
10

11
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 18
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.