RSCH20001 "What is the Nature and Impact of Disruptors on the Residential Property Market in Regional Queensland?"
- Subject Code :
RSCH20001
- University :
Central Queensland University Exam Question Bank is not sponsored or endorsed by this college or university.
- Country :
Nigeria
NETWORK ROUTING
010 Element Coursework (3000 words) (2021 MOD003262 TRI2 F01CAM)
1918662
Executive Summary
Anglia Marketing Services organization is facing performance issues because the network of the organization goes down often. So, there is a need for a new design to fulfill the organization's standards. There is also a need to expand the network for future needs, which is not possible in the current scenario as end devices are directly connected with the routers, so we can only connect one device. So, we design a new network considering the organization's needs. So, we utilized switches to overcome the hurdle of network expansion of the network in the future by utilizing switches in a network. We cover wireless access needs by using a wireless router in a network. It is necessary to safeguard all sites with strong passwords and limit access to only secure methods of connection to prevent data theft. So, we implement Access Control methods. We configured VLANs on switches as by acting as LAN segments, VLANs help reduce the quantity of network traffic by preventing collisions and minimizing the number of network resources used. A bridge or switch transports data packets delivered from a workstation in a segment, ensuring that no collisions are carried out by delivering broadcasts to all network devices instead of transmitting collisions to each other. The switches are very useful for expanding and segmenting network traffic, which the firm needed. It's also a good idea to consider the possibility of redundancy. For establishing communication between VLANs protocol of Inter VLAN Routing is utilized. For communication between different networks, we utilized protocol of OSPFv2 in a network that covered the organization's needs. To overcome the IP address conflict, we utilized the protocol of DHCP in a network responsible for automatically assigning IP addresses.
Table of Contents
TOC o "1-3" h z u Technical Glossary PAGEREF _Toc99442700 h 2Introduction PAGEREF _Toc99442701 h 4Addressing Scheme and Current Issues PAGEREF _Toc99442702 h 5Network Address Table PAGEREF _Toc99442703 h 5Network Design PAGEREF _Toc99442704 h 6Configured VLANs and Assigned to Hosts PAGEREF _Toc99442705 h 7Configured Inter-VLAN Routing PAGEREF _Toc99442706 h 9Access Control and Security PAGEREF _Toc99442707 h 17Switching and DHCP PAGEREF _Toc99442708 h 18Configured DHCP PAGEREF _Toc99442709 h 18 PAGEREF _Toc99442710 h 22Configured Floating Stating Routes PAGEREF _Toc99442711 h 22Bibliography PAGEREF _Toc99442712 h 26
Technical GlossaryAddressing Scheme To ease communication over a computer network, an addressing system is required. Packets are transferred from one location to another via an addressing scheme. There are three layers of the TCP/IP protocol stack model: levels 2, 3, and 4, and each of these levels creates a unique header for the data being sent.
Current Issues The PC is directly connected to a router in the current network, so we cannot expand the network as it allows only one PC to connect with a network.
VLANs A data link layer broadcast domain is a segmented and isolated portion of a computer network.
Inter VLAN Routing Network traffic is forwarded from one VLAN to another through this technique.
Dynamic Routing Based on the current state of the communication circuits in a system, a router may take a different route for a given destination.
OSPFv2 A link-state routing protocol sends router interface information to other routers through LSAs.
Access Control Defining who is permitted to access and utilize corporate information and resources is essential for data security.
DHCP It is a Dynamic Host Configuration Protocol used to automatically assign IP addresses to network devices.
Switching It is a mechanism utilized in a network of computers for information exchange between different PCs and segments.
Scalability A network can handle sudden workload changes that happen in the network.
Resilience It refers to a service responsible for providing an acceptable service level when faults and challenges happen and continuing the normal operation.
IntroductionCambridge-based Anglia Marketing Services has expanded to include offices in London and Manchester and its original headquarters. The profitability and reputation of the firm have deteriorated due to the company's reliance on an old network that often goes down. A new design is required to fulfil the following standards, which include the need for a single internet connection at the Cambridge site, among other things. Each site must support at least 900 hosts in Cambridge, 1200 hosts in London, and 1500 hosts in Manchester, depending on their location. Because of this year's rapid change in in-laws, it is necessary to safeguard all sites with strong passwords and limit access to only secure methods of connection to prevent data theft. It has also been reported that switches are useful for expanding and segmenting network traffic, which the firm has heard about. It is also a good idea to consider the possibility of redundancy CITATION AlB12 l 1033 (Al-Bahadili, 2012). There are three VLANs needed for each of the three sites.
The CFO has authorized the allocation of funds for the design, justification, and building of a new network for the company to do this. Currently, this network can only accommodate a small number of PCs per site, but with your help, this will be able to increase significantly in the future. It is necessary to take into consideration the following requirements. Marketing has been allocated to VLAN 10, and Human Resources have been assigned to VLAN 20. VLAN 30 is labeled as "Consulting." It is up to us to decide how to partition the layer 2 networks and to provide an explanation for your decision. At each site, we must have an operational routing protocol. Following a series of service interruptions in the past, the organization is looking for a means to keep the network operational even if dynamic routing is not successful. There must be a line speed of 64000 on every serial line. Cambridge has its internet connection, which is shared with the rest of the university via its network. Because the work of the Manchester branch is so critical, they cannot use the internet at any time throughout the day. Furthermore, the organization desires that the company automatically allocate each user's end device an IP address.
Addressing Scheme and Current IssuesNetwork Address TableBranch VLAN# Network Address Subnet Mask Valid Hosts Ranges Broadcast Address
Manchester VLAN10 172.20.0.0 255.255.254.0 172.20.0.1-172.20.1.254 172.20.1.255
VLAN20 172.20.2.0 255.255.254.0 172.20.2.1-172.20.3.254 172.20.3.255
VLAN30 172.20.4.0 255.255.254.0 172.20.4.1-172.20.5.254 172.20.5.255
London VLAN10 172.20.6.0 255.255.254.0 172.20.6.1-172.20.7.254 172.20.7.255
VLAN20 172.20.8.0 255.255.254.0 172.20.8.1-172.20.9.254 172.20.9.255
VLAN30 172.20.10.0 255.255.254.0 172.20.10.1-172.20.11.254 172.20.11.255
Cambridge VLAN10 172.20.12.0 255.255.254.0 172.20.12.1-172.20.13.254 172.20.13.255
VLAN20 172.20.14.0 255.255.254.0 172.20.14.1-172.20.15.254 172.20.15.255
VLAN30 172.20.16.0 255.255.254.0 172.20.16.1-172.20.17.254 172.20.17.255
The PC is directly connected to the router in the current network, so we cannot expand the network as it allows only one PC to connect with a network. The company's profitability and reputation have suffered due to using an outdated network that often goes down. This present network of the organization does not support further large-scale expansion as it is expandable to a small extent as only a few PCs/sites are allowed. After experiencing previous service outages, the organization seeks a way to keep the network running even if dynamic routing fails. Further issues of scalability, security, reliability and network down are serious issues. So these types of networks must be upgraded.
Network Design
Network Design SEQ Network_Design * ARABIC 1
The designed network is for three sites of the organization. Each site has its separate router, which is connected to the switch of each site, so three switches are utlised in a network. The three routers are of three different networks, so the protocol of OSPFv2 is utilised for their communication. VLANs are configured within the same network for improvement points of view and to increase securityseparate VLANs for each department of every site. For communication between VLANs, Inter VLAN routing protocol is utilized. End devices are connected with the switches. DHCP is utilized to automatically assign IP addresses to the devices that connect with the network.
By acting as LAN segments, VLANs help reduce the quantity of network traffic by preventing collisions and minimizing the number of network resources used (Yu et al., 2011). A bridge or switch transports data packets delivered from a workstation in a segment, ensuring that no collisions are carried out by delivering broadcasts to all network devices instead of transmitting collisions to each other.Configured VLANs and Assigned to HostsS1
-1524010668000
Configuration of VLAN S SEQ Configuration_of_VLAN * ARABIC 1
-2540036830000S2
Configuration of VLAN SEQ Configuration_of_VLAN * ARABIC 2
038481000S3
Configuration of VLAN S SEQ Configuration_of_VLAN * ARABIC 3
Security, dependability, and efficiency improve when a network is segmented. A VLAN may be used in several ways to meet the requirements of a company. Using a virtual private network (VLAN) to segment the network is a common technology usage. In this way, guests may connect to the internet without sharing the same network as the staff members. Allowing only authorized users to access networks with extremely sensitive information may be achieved by using VLANs to restrict user access. Guest/staff is a good analogy for this situation, but another example would be to split finance and HR personnel. Segmenting user traffic in this way makes the system more secure and makes it easier to operate. The increased security of using a VLAN is one of its most appealing features. Network traffic separation keeps out undesired and unauthorized users and devices, lowering security risks and safeguarding private information (Sowjanya and Anitha, 2020).
Each VLAN in a network may have its own set of security software and firewalls, making it more difficult to compromise the whole network for an attack on one VLAN. VLANs simplify managing the network's IT infrastructure (Hantouti, Benamar, and Taleb, 2019). It is easier for IT to manage VLANs and groups of devices if they are segregated based on users with comparable network needs and roles. If a problem arises with one VLAN, management may set up unique security rules depending on the users in that VLAN, and debugging issues affecting various VLANs can be accomplished much more quickly as a result. Each VLAN might be given a name that reflects its unique qualities. As well as making network management simpler, VLANs allow administrators and end-users alike to be more flexible. Using VLANs, remote users and devices may effortlessly connect to one other, regardless of location. A user can remain on the same network even if they change desks in an office. To plan for future expansion in the company, VLANs may be used. A stable, extensible network is a must (Hantouti, Benamar and Taleb, 2019).
Configured Inter-VLAN Routing-762037655500Manchester
5276850107251500
InterVLAN Routing Configuration SEQ InterVLAN_Routing_Configuration * ARABIC 1
762038544500London
InterVLAN Routing Configuration SEQ InterVLAN_Routing_Configuration * ARABIC 2
052578000Cambridge
InterVLAN Routing Configuration SEQ InterVLAN_Routing_Configuration * ARABIC 3
Network segmentation is the process of transporting packets between hosts in different network segments using inter-VLAN routing protocols (Smeriga and Jirsik, 2019). Because VLANs are logical connections, they make it easier to segment a network, which improves speed and flexibility by increasing network partitioning. The protocol we utilize in a network is the Router on a stick protocol. In "Router on a stick" arrangements, a single physical interface may route traffic between many VLANs on a single physical interface. A trunk switch port is connected to the router's interface, configured as a trunk connection in the router's configuration.
Testing
Testing SEQ Testing * ARABIC 1
Dynamic Routing
Dynamic routing is a networking technique that guarantees that data is routed in the most effective way possible. According to Li et al. (2020), dynamic routing enables routers to choose paths based on changes in the logical network topology that occur in real-time. A router's routing protocol takes responsibility for building, maintaining, and updating the dynamic routing table when dynamic routing is enabled on the router. Static routing requires the system administrator's manual completion of these actions (Cuvelier and Gourdin, 2019). Several different approaches and protocols are used in dynamic routing operations. RIP and OSPF are the most extensively used routing protocols globally, according to statistics (OSPF) (Waqas et al., 2019). The following are the operations of the dynamic routing protocol that may be summarized:
Routing messages are transmitted between the router and the interfaces it is connected to. Other routers using the same routing protocol as the one being used may be able to view the routing messages and information. Routers can learn about thousands of miles of distant networks by using routing information. When the topology of a network changes, the routing protocols send notifications to other network devices.
Khan, Khan Safi, and Quershi (2018) opine that the use of dynamic routing on large networks is easier to set up and more straightforward when it comes to picking the best way, detecting route adjustments, and locating distant networks, among other things. Routing that is dynamic. As a result of the usage of routing protocols in static routing, routers use more bandwidth, and the CPU and RAM of the routers may be subjected to higher strain due to the increased workload placed on them. In the end, static routing is more secure than dynamic routing since it is more predictable. Performance and scaling advantages high data traffic on nodes in a network. It does not have to redirect as frequently as other systems. It may be set up automatically by administrators. In this way, they increase the trustworthiness of the network. More sturdy hardware is needed. Static protocols need more time and effort.
Configured Dynamic Routing Protocol OSPFv2
-2286036449000Manchester
OSPFv2 Configuration SEQ OSPFv2_Configuration * ARABIC 1
London
-1524083820005181600114935000
OSPFv2 Configuration SEQ OSPFv2_Configuration * ARABIC 2
0360045005175250140970000Cambridge
OSPFv2 Configuration SEQ OSPFv2_Configuration * ARABIC 3
The OSPFv2 protocol of routing is configured in a network. LSAs, a link-state routing protocol, are used to communicate information about router interfaces to other routers. It is determined which router is the shortest way to any neighboring router by using an identical area-topology database that is kept by every router in the network. The IP routing protocol (IGP) is a subset of the wider IP Routing protocol family (Wang et al., 2018). It is used as an Autonomous System (AS) in the internal distribution of routing information inside an IP network. OSPF is a routing protocol that is useful for both the IPv4 and the IPv6 protocols that are routed. Traffic balancing is achieved by taking equal-cost routes to the same location. Using VLSM, you may get a visual overview of your path. There are an infinite number of hops. Updates may be initiated to expedite the convergence process. The SPF algorithm generates a topology that is devoid of loops. The vast majority of routers support this. Protocols that are not classified.
Display Routing Table
Manchester
Display Routing Table SEQ Display_Routing_Table * ARABIC 1
London
762076200005156200107315000
Display Routing Table SEQ Display_Routing_Table * ARABIC 2
Cambridge
Display Routing Table SEQ Display_Routing_Table * ARABIC 3
Testing
Testing
Access Control and SecurityAllowing only individuals with proper credentials to access private networks is known as "network access control." Network access control is necessary to ensure that only authorized devices have access to your network. Only devices with the most recent security patches and anti-intrusion software can access this control. Individual rooms, buildings, and campuses may all benefit from a physical security system to keep out unauthorized individuals CITATION SHE19 l 1033 (KIMANZI, 2019). With logical access control, restrict access to data sources such as computer networks and system files.
Restrictions on data and information processing systems are essential. They assist in reducing the risk of unauthorized access to information and the risk of a data security breach.
Firewalls and VPN encryption are two types of security that may be found in conjunction. Access control, virus and anti-virus software, and other areas of network security are only a few of the numerous options available CITATION Cis08 l 1033 (Press., 2008). Employee safety is very important for any business since it reduces the amount of insurance, compensation, and liabilities that a company must pay to its stakeholders and the resulting increase in revenue and decrease in operational expenses.
Switching and DHCPIt is a mechanism utilized in a network of computers for information exchange between different PCs and segments. Devices on an Internet Protocol (IP) network can automatically get an IP address and other communication settings using the Dynamic Host Configuration Protocol. This means they do not have to do anything manually to get these settings (DHCP). To make this system work, only two things need to be on the network: a network DHCP server in the cloud and client instances of the protocol stack in each computer or device on the network. This is how it works: There are two ways that clients can get connected to networks: The first time, they connect to networks by getting parameters from their DHCP server (Alsaadi and Abdul-Zahra, 2016). They then use these parameters when they want to connect again. This protocol can also be used on large university and regional Internet service provider networks and other types of networks. There are a lot of routers and home gateways that can act as DHCP servers. A home network is set up when the Internet service provider gives each router a unique IP address. This allows each router on the network to talk to other routers on the network (ISP). Each device on a local network, which the network administrator runs, gets an IP address from a DHCP server that the network administrator runs. This server gives each device an IP address.
Clients who make requests for IP addresses are assigned via the use of the DHCP protocol, which is simple. Consequently, the time required for manual IP address configuration may be reduced. There will be no additional costs related to the implementation of the system. IP addresses cannot be assigned more than once or erroneously due to this feature. Because of this, there is no possibility of IP address conflicts. It simplifies the administration of networks. There are various scopes available, including the multicast scope and superscope. It significantly benefits mobile users since the necessary network configuration parameters are promptly obtained.
Configured DHCPManchester
DHCP Configuration SEQ DHCP_Configuration * ARABIC 1
London
DHCP Configuration SEQ DHCP_Configuration * ARABIC 2
Cambridge
DHCP Configuration SEQ DHCP_Configuration * ARABIC 3
Testing
Testing
7620401320
071577200003398520Testing
Testing
Configured Floating Stating RoutesManchester
Floating Static Route Configuration SEQ Floating_Static_Route_Configuration * ARABIC 1
London
Floating Static Route Configuration SEQ Floating_Static_Route_Configuration * ARABIC 2
Cambridge
Floating Static Route Configuration SEQ Floating_Static_Route_Configuration * ARABIC 3
The router chooses the best path for a packet to follow to reach its destination when a static route is set with an Administrative Distance larger than the preferred route. The router chooses the best path for a packet to follow to reach its destination when a static route is set with a larger Administrative Distance than the preferred route. We have to manually adjust the Administrative Distance (AD) to a greater amount for the better route based on other attributes to be favored because static routes in Cisco have an AD of 1. An administrative distance modification has resulted in "floating static routes" instead of static routes that have not been altered. Depending on the situation, some situations need the usage of floating routes in conjunction with another static route or with a dynamic routing protocol. The usage of floating static routes may be a fallback in either situation.
In a small network, it's simple to put into action. Useful as default static routes are very basic topologies. Even though the journey is always the same, this is a highly predictable experience. There is no need for a routing algorithm or an updating mechanism. As a result, no additional resources (such as CPU and RAM) are needed.
It's a safe bet. Unlike with dynamic routing systems, no advertising is transmitted. As a network develops, so does the amount of configuration that must be done. Static configuration management in big networks may take a lot of time. A static route cannot redirect traffic if a connection breaks. As a result, traffic must be rerouted by human intervention.
Connectivity/Testing
Connectivity
References
BIBLIOGRAPHY Al-Bahadili, 2012. Simulation in computer network design and modeling: Use and analysis.. In: s.l.:s.n.
Anon., 2017. What is Quality of Service (QoS) in Networking?. [Online] Available at: https://www.fortinet.com/resources/cyberglossary/qos-quality-of-service
Anon., 2020. WHAT IS A LAN? WHY SECURE LOCAL AREA NETWORK?. [Online] Available at: https://zencc.net/blog/what-is-a-lan-why-secure-local-area-network
Anon., n.d. How to Set Up a Secure Home Network. [Online] Available at: https://www.kaspersky.com/resource-center/preemptive-safety/how-to-set-up-a-secure-home-network
Anon., n.d. Understanding Variable Length Subnet Masks (VLSM). [Online] Available at: https://study-ccna.com/variable-length-subnet-mask-vlsm/
Anon., n.d. What is DHCP and Why it is important?. [Online] Available at: https://www.efficientip.com/what-is-dhcp-and-why-is-it-important/
Breeding, M., 2020. Designing and Building the Best Small Office Network from the Ground Up Network Computing. [Online] Available at: https://librarytechnology.org/document/1236.
Gupta, P., n.d. Extended Star Topology. [Online] Available at: https://www.educba.com/extended-star-topology/
Herbst, J., 2019. How to Build in Redundancy for a Reliable Network. [Online] Available at: https://www.summit360.com/2019/01/09/how-to-build-in-redundancy-for-a-reliable-network/
Johansen, A. G., 2020. 10 benefits of a VPN you might not know about. [Online] Available at: https://us.norton.com/internetsecurity-privacy-benefits-of-vpn.html
KEARY, T., 2021. Network Topology: 6 Network Topologies Explained & Compared. [Online] Available at: https://www.comparitech.com/net-admin/network-topologies-advantages-disadvantages/#:~:text=The best cabled network topology,get full traffic management features.
KIMANZI, S., 2019. How to configure Switch Port Security in Packet Tracer. [Online] Available at: https://computernetworking747640215.wordpress.com/2019/11/12/switch-port-security/
Kuhn, A., 2021. For large networks which topology is used?. [Online] Available at: https://moviecultists.com/for-large-networks-which-topology-is-used
Maupin, R., 2017. Network Engineering. [Online] Available at: https://networkengineering.stackexchange.com/questions/41014/why-cant-devices-in-different-subnets-talk-with-each-other
PRAMATAROV, M., 2021. What is DHCP? How does the DHCP server work?. [Online] Available at: https://www.cloudns.net/blog/dhcp-server/
Press., C., 2008. Security Features on Switches. [Online] Available at: https://www.ciscopress.com/articles/article.asp?p=1181682&seqNum=12
Reardon, T., 1997. Planning, Designing and operating local area networks,. DISAM Journal.
Roomi, M., 2020. 7 Advantages and Disadvantages of LAN | Limitations & Benefits of LAN. [Online] Available at: https://www.hitechwhizz.com/2020/07/7-advantages-and-disadvantages-drawbacks-benefits-of-lan.html
Shimonsk, R. J., 2010. The Importance of Network Redundancy. [Online] Available at: https://techgenix.com/importance-network-redundancy/
STEGNER, B., 2021. What's an IP Conflict and How Do You Resolve It?. [Online] Available at: https://www.makeuseof.com/tag/whats-ip-conflict-resolve/
Appendix
DHCP Dynamic Host Configuration Protocol
OSPFv2 Open Shortest Path First Version 2
VLANs Virtual LANs
AD Administrative Distance
AS Autonomous System
IGP Interior gateway protocol
LSAs Link State Advertisements
IP Internet Protocol