1. Introduction
Background
This project report is being documented based on specific requirements of setting up a Network for a particular College with the help of necessary details of requirements provided. In this process, a fully functional network structure design has been analyzed and appropriated. This has been done for a proper understanding of the requirements.
Purpose
The specific purpose for the documentation report is to provide a detailed understanding of the exact physical network requirements with the help of proper justification of the structured network design topology. This report consists of proper tables, diagrams and testing with a demonstration for required network design and specific approach.
Definitions
In this system, the application of SDN or Software Defined Networking is necessary to be processed. This scenario helps proper maintenance of the networking fundamentals of operation, including various security aspects. Use of DNS or Domain Name System server has also been appropriated in this report with proper justification.
2. Knowledge and Understanding
Demonstration of Effective Approach
In this topic of discussion, the specific detailing of the required approach has been demonstrated with the help of proper documentation of valid findings. Intensive research has been conducted for applicable scenario regarding the requirement to structure and troubleshoot the networking requirements according to provided data and application. Comer (2018) has stated that the application of proper networking concept of implementation provides an organization with the proper use of internet facilities for their required tasks to be processed. The aspect of required
troubleshooting for this network design has been provided in this report with the help of proper assessment of specific requirements. According to Halsey and Ballew (2017), troubleshooting is critically essential to analyze various impending or upcoming issues properly within a specific networking system in concern.
In this assignment, the required specifics have been addressed with proper priority to each segment of necessary implementation and processing required for respective network design. This particular college requires separate network setups for the applicable Finance/HR, Academics, Library, Computer Lab and Classrooms. These services would be within a LAN infrastructure. Applicable processing of valid requirements is to be analyzed for the various procedures. As influenced by Bahry and Sugiantoro (2018), within an Additional Requirement, the application of specific Wireless Devices has been appropriated according to sufficient requirement within College students and respective staff. As a part of network administration and access to external services like the establishment of a connection with other networks or the internet, applicable insight has been provided for the requirement (Comptia.org, 2019). Four specific servers comprising of Domain Naming System server, Web Server, email server and file server have been provided.
Figure 1: Network Design (Logical)
Logical Diagram for the required network has been provided specifically in this report. This diagram would help in understanding the exact structure and requirements of devices to build this particular network. Within this system of approach, IP addresses are to be assigned within each of major networking system with the help of proper resolution within each IP range allocated for specific departments and workstations. Alves et al. (2018) have opined that this system needs to be observed for further development in future regarding physical network Infrastructure for processing the necessary requirements. Therefore, the address range allocated within the system needs to be designed with proper accommodation to a valid applicable scenario of processing. Detailed IP addressing scheme and application of ACLs have been provided in this assignment for proper understanding.
Summary
Applicable appropriation of proper research has been provided for the valid reasoning for building up specific network infrastructure according to provided requirement. In this system, the application servers have been appropriated with each server associated with a specific task of processing. Mikroyannidis et al. (2018) have opined that the application of four separate servers for separate processing provides network design with a proper structure of maintenance and processing. According to provide IP addresses for the private network of an organization using a private IP address within a LAN system. Separate IP scheme for the wireless network has also been provided according to specific requirements.
3. Application and Analysis
Examination and analysis of network components
In this system, the applicable network components are server systems, routers for each network segment, Wireless router for a wireless system, various switches according to the number of accommodated hosts, fibre optics and copper wires, serial DTE connections for specific uses and the applied system workstations and printers as end devices for required segments. As influenced by Kumar et al. (2019), PT-Routers have been used in this application process with serial DTE connection among themselves and Fast Ethernet connection among serves and respective switches. Other than that, the proper analysis of various specific requirements of processing has been analyzed for the system.
Switches used in this system are Switch-2960 with 24 Fast Ethernet ports and 2 Gigabit Ethernet ports. In this system, the applicable scenario has been analyzed with the help of proper requirement for network system in each department. WRT 300N wireless router has been used for specific wireless devices connected to the network. Relationships among various departments have been accessed with the help of proper analysis of the requirements (Ventre et al. 2017). In this system, applicable network design has been appropriated with proper use of separate servers for processing specific requirement analysis of a particular scenario. Each server has been conned duly with the respective network router.
Reasoning of Device
These specific devices have been used for appropriate reasoning of proper analysis of required resources. In this system, device configurations have been done in order to provide a proper application of required procedures of analysis and processing. In this system, each device used has been appropriated for their specific mode and functionalities of operation. As influenced by Kotov, Tolkachev and Sinyaeva (2017), use of PT-router has been done because they are cheap compared to other routers, and they provide proper port space for serial and variable Ethernet connections. Use of Switch-2960 has been done because this switch system provides with the maximum number of ports required for setting up of respective network with 24 Fast Ethernet ports and 2 Gigabit Ethernet ports.
Discussion and analysis of Network Models
In this discussion, a particular description has been provided for applicable network models. There are two basic types of network models. One is the Protocol Model, and another is a Reference Model. Detailed analysis of the two types of network model has been provided in table structure presented below:
Protocol Model | Reference Model |
This model matches the certain structure of the respective protocol suite |
This model is focused on reference to all common types of protocol suites |
An example of a protocol model is the 4-layer TCP/IP or Transfer Control Protocol/Internet Protocol model (Howtonetwork.org, 2019) |
An example of a reference model is the 7- layer OSI or Open Systems Interconnection model (Shimba, Mahenge and Sanga, 2017) |
In this model respective Network Access layer does not provide knowledge of which protocol to use for transmitting data |
In this model respective OSI layers discuss and provide knowledge of which protocol to use for transmitting data |
Application Layer of this model contains various protocols for reference |
OSI model layers 5-7 are applied for specific use as a reference |
Table 1: Discussion and analysis of network models
Applicable discussion and analysis of various network models have been provided in specific table structure presented above.
4. Evaluation and Judgment
The judgment of selected components
In this discussion, specific judgment has been provided for the applicable network design scenario. Applicable use of proper analysis and designing has been provided for variable application of system procedures for reference. Bjorner, Canini and Sultana (2017) have commented that the use of proper devices that are compatible in operating within a specific structure of network infrastructure is necessary. In order to implement the proper application of specific networking requirements, the 7-layer OSI network Model is required to be implemented with a specific purpose of the operation. Evaluations of various technologies that can be used have been appropriated below.
Evaluation of Technologies
Use of virtual LAN system is necessary for specific operation of various valued applications and their justification. In this system, switches can be configured with specific virtual LANs for proper assessment of the networking requirements for a specific department in concern. Application of trunking can be applied with proper implementation in order to link the system with printers as end devices within a proper bus topology of implementation saving time and cost of extensive wiring (Irianto et al. 2018). Access control lists are required to be implemented with a proper application of system-related procedures of implementation. In this system, the applicable scenario has been appropriated for the proper building of specific systems for analysis of required ACLs. DHCP connections can be established. In this system, the applicable scenario has been analyzed for the proper application of specifically required implementations.
5. Design and Implementation
Implementation and Configuration
In this system, the applied procedure of processing proper communication among the valid systems has been generated. In this application scenario, the proper justification has been provided for the network design specified in this process.
Figure 2: Network Topology
The IP addressing table for the required network has been provided as follows:
Router Address | Subnet Mask | IP range | |
Classroom Router | 71.81.92.0 | 255.255.255.224 | 71.81.92.1-71.81.92.30 |
Computer Lab Router |
71.81.93.0 | 255.255.255.192 | 71.81.93.1-71.81.93.62 |
Library Router | 71.81.94.0 | 255.255.255.192 | 71.81.94.1-71.81.94.62 |
Academics Router | 71.81.95.0 | 255.255.255.224 | 71.81.95.1-71.81.95.30 |
Finance/HR Router | 71.81.96.0 | 255.255.255.240 | 71.81.96.1-71.81.96.14 |
Wireless Router | 10.11.0.0 | 255.255.255.248 | 10.11.0.0-10.11.0.7 |
Table 2: IP addressing table
The detailed IP addressing table for each specific router has been provided with a proper setting of the addresses according to the requirement of devices within each department Van et al. (2018). IP address range has been processed with proper analysis of the valid methods for keeping a range requiring future expansion of the network.
Planning for necessary devices
Access Control List table has been provided for the particular system according to the required limitations of access provided for the applications.
Sequence | Action | Protocol | Source Address (Host) | Destination Address (Host) | Specifications |
1 | Permit | tcp | (Inbound) 71.81.92.0 | 71.81.91.0 | eq www |
2 | Deny | ip | (Outbound) 71.81.92.0 | any | NA |
3 | Permit | ip | any | (Inbound) 71.81.91.0 | NA |
Table 3: ACL Classroom router
Computer Lab Router
Sequence | Action | Protocol | Source Address (Host) | Destination Address (Host) | Specifications |
1 | Permit | tcp | (Inbound) 71.81.93.0 | 71.81.91.0 | eq www |
2 | Deny | ip | (Outbound) 71.81.93.0 | any | NA |
3 | Permit | ip | any | (Inbound) 71.81.91.0 | NA |
Table 4: ACL Computer Lab router
Library Router
Sequence | Action | Protocol | Source Address (Host) | Destination Address (Host) | Specifications |
1 | Permit | tcp | (Inbound) 71.81.94.0 | 71.81.91.0 | eq www |
2 | Deny | ip | (Outbound) 71.81.94.0 | any | NA |
3 | Permit | ip | any | (Inbound) 71.81.91.0 | NA |
Table 5: ACL Library router
Academics Router
Sequence | Action | Protocol | Source Address (Host) | Destination Address (Host) | Specifications |
1 | Permit | tcp | (Inbound) 71.81.95.0 | 71.81.91.0 | eq www |
2 | Deny | ip | (Outbound) 71.81.95.0 | any | NA |
3 | Permit | ip | any | (Inbound) 71.81.91.0 | NA |
Table 6: ACL Academics router
Finance/HR Router
Sequence | Action | Protocol | Source Address (Host) | Destination Address (Host) | Specifications |
1 | Permit | tcp | (Inbound) 71.81.96.0 | 71.81.91.0 | eq www |
2 | Deny | ip | (Outbound) 71.81.92.0 | any | NA |
3 | Permit | ip | any | (Inbound) 71.81.91.0 | NA |
Table 7: ACL Finance/HR router
Wireless Router
Sequence | Action | Protocol | Source Address (Host) | Destination Address (Host) | Specifications |
1 | Permit | tcp | (Inbound) 10.11.0.0 | 71.81.91.0 | eq www |
2 | Deny | ip | (Outbound) 10.11.0.0 | any | NA |
3 | Permit | ip | any | (Inbound) 71.81.91.0 | NA |
Table 8: ACL Wireless router
Autonomy and Independence
In this specific scenario, applicable association with the specific autonomy and independence of valid network systems and devices according to the requirements of the establishment has been appropriated (Nationalcyberwatch.org, 2019). This procedure has been done with proper IP addressing and required use of Access Control Lists. Network devices proficiently require certain independent privileges and facilities to work within the respective system procedure. In this applicable scenario, proper insight has been provided for the required justification and presentation of proper network requirement structure.
6. Testing
Testing of requirements
Valid testing can be provided for the network according to specific requirement analysis of the procedure of physical setup and implementation. Valid testing of the specific system has been done with the help of proper establishment of required Networking scenario using Cisco Packet Tracer. As influenced by Csikor and Pezaros (2017), this network diagram has been referenced regarding the various applicable scenario of processing exact structural topology for valid requirements. Access Control Lists have been implemented within this network design along with the proper association of IP addresses to various devices according to specific IP addressing table presented above. Requirement testing needs to be done with a proper backtracking or simultaneous testing of the validity of a system in development needs to be followed.
Demonstration
Demonstration of this network design can be done with the help of various applications of ping testing and Access control testing. Other than that, the applicable network can be tested with the help of various network performance monitoring tools like Wireshark. Eichelberger et al. (2017) have stated that in order to get a proper understanding of basic network security by assessment of vulnerabilities within the system tools like Nessus and Nmap can be used with proper commands of processing required particulars of operation.
7. Reflection
In this particular document, I have analyzed detailed networking requirements for applicable system regarding the required set up of a fully functional network for a College. As a network engineer, I have processed required network design after proper research and analysis of various aspects of networking and troubleshooting similar or related to the requirements mentioned by College authorities. Referenced from Baier, Hoepner and Sather (2018), I have provided specific IP addressing with proper subnetting for required network segments associated with various departments of this college. This network design justification provided by me within this report will provide proper guidance in setting up the required physical networking system.
This report presentation has been provided with proper details to various theoretical and implementation aspects of networking with proper use of hardware, software and other related requirements like relationships, Independence and functionality (Kuhr and Carôt, 2018). Both Logical and Physical network diagrams have been provided with proper conditioning of the system with the help of Cisco Packet Tracer for the proper establishment of Network Topology. Other tools and use of software to maintain various aspects of network relating to security and integrity needs to be properly understood after setting up of respective network design and configuration provided.
8. Conclusion
This particular assignment report has been focused on the applicable association of proper concepts of networking that would help in proper assessment of the required particulars of networking. In this report, proper research has been done related to various detailed concepts of networking with proper analysis of the structural procedures. Along with the proper application of required IP addressing and Access Control Lists, respectively applicable scenario has been presented for proper physical processing of designed network topology.
In this particular documentation, applicable insight has been presented with the help of proper analysis of various researches conducted in respective fields of networking. These researches have been referenced and properly cited within this report. Application of specific networking concerned with a required scenario of provided college and their infrastructure have been duly appreciated in this report. Proper use of table structures has been initiated to describe or present various aspects of this particular networking requirement and documentation.
References
Books
Comer, D.E., 2018. The Internet book: everything you need to know about computer networking
and how the Internet works. Boca Raton: Chapman and Hall/CRC.
Halsey, M. and Ballew, J., 2017. Windows networking troubleshooting. New York: Apress.
Journals
Alves, A.R., Moura, H.D., Borges, J.R., Mota, V.F., Cantelli, L.H., Macedo, D.F. and Vieira, M.A., 2018, April. HomeNetRescue: An SDN service for troubleshooting home networks. In NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium (pp. 1-7). IEEE.
Bahry, M.S. and Sugiantoro, B., 2018. Analysys and Implementation IEEE 802.1 Q to Improve Network Security. IJID (International Journal on Informatics for Development), 6(2), pp.7-11. Bjorner, N., Canini, M. and Sultana, N., 2017. Report on networking and programming languages 2017. ACM SIGCOMM Computer Communication Review, 47(5), pp.39-41.
Csikor, L. and Pezaros, D.P., 2017, December. End-Host Driven Troubleshooting Architecture for Software-Defined Networking. In GLOBECOM 2017-2017 IEEE Global Communications Conference (pp. 1-7). IEEE.
Mikroyannidis, A., Kear, K., Smith, A., Jones, A., Rosewell, J., Donelan, H., Wermelinger, M., Sanders, C., Third, A. and Connolly, T., 2018, October. The Open Networking Lab: Hands-on Vocational Learning in Computer Networking. In 2018 IEEE Frontiers in Education Conference (FIE) (pp. 1-5). IEEE.
Online Articles
Baier, C.K., Hoepner, J.K. and Sather, T.W., 2018. Exploring Snapchat as a dynamic capture tool for social networking in persons with aphasia. Aphasiology, 32(11), pp.1336-1359. [Online]
Available at <https://www.tandfonline.com/doi/abs/10.1080/02687038.2017.1409870> [Accessed on 15/11/2019]
Kuhr, C. and Carôt, A., 2018, October. Troubleshooting Resource Reservation in Audio Video Bridging Networks. In Audio Engineering Society Convention 145. Audio Engineering Society. [Online] Available at <http://www.aes.org/e-lib/online/browse.cfm?elib=19819> [Accessed on 15/11/2019]
Websites
Comptia.org, 2019. A Guide to Network Troubleshooting: Basic Steps, Tips and Tools. Available at <https://www.comptia.org/content/guides/a-guide-to-network-troubleshooting> [Accessed on 15/11/2019]
Howtonetwork.org, 2019. Network Fundamentals – Summary. Available at <https://www.howtonetwork.org/design/ccda/chapter-1-network-fundamentals/network-fundamentals-summary/> [Accessed on 15/11/2019]
Nationalcyberwatch.org, 2019. Networking Fundamentals. Available at
<https://www.nationalcyberwatch.org/programs-resources/curriculum/technical-course/ncc-200-networking-i-networking-fundamentals/> [Accessed on 15/11/2019]