Low-level design and configuration of lan

Assignment Help Computer Networking
Reference no: EM132304981

Low-Level Design and Configuration of Lan/WAN network for an SME network

Purpose of the Assessment

The purpose of this assignment is to simulate the network for an SME (small and medium sized enterprise) proposed and designed based on the requirements. A thorough verification and evaluation analysis should be presented to meet the ULO mapping in the Unit Description.
c. Evaluate, different WAN protocols; such as HDLC, PPP, Frame Relay, DHCP, ISDN, NAT and PAT in a network environment, and configure, verify, troubleshoot related equipment;
d. Plan and design LAN and WAN networks and evaluate their performance;
e. Implement IPv4 and IPv6 in WAN networks and critically compare their designs;
f. Propose, and report on, hierarchical network models for campus and other applications;
g. Develop a systematic approach to analyse and solve various network problems.

Assignment Description

There are two parts to this assignment, part A and part B.

Two broad areas to be considered for VPN network design in this assignment are as under;

1. Propose/design a VPN for the scenario given below including LAN and WAN settings.

2. Configure and implement the network at low-level design, this part should be done using CISCO Packet Tracer.
Contents must include:
High-level network design summary Solution Design
i. Network Topologies
ii. IP addressing
iii. Configuration details and screenshots to present low-level design
iv. Verification methodologies and evaluation analysis

Scenario
Many companies use frame relay or leased lines to provide secure communications with their business partners, subsidiaries, and vendors. Unfortunately, these solutions are often expensive and geographically limiting. VPN offers an alternative for companies who want private, cost-effective communications.

Suppose you are a major parts supplier to a manufacturer. Since it is critical that you have the specific parts and quantities at the exact time required by the manufacturing firm, you always need to be aware of the manufacturer's inventory status and production schedules. Perhaps you handle this interaction manually today, and find it time consuming, expensive and even inaccurate at times. You want to find an easier, faster, and more effective way to communicate with your manufacturing company. However, given the confidentiality and time-sensitive nature of the information you exchange, the manufacturer does not want to publish it on its corporate Web site or distribute it monthly in an external report. By exploiting the public Internet, you can easily establish a VPN to meet the needs of both companies. The objectives of this scenario are as follows:

Objectives
In this scenario, MyCo wants to establish a VPN between a host in its parts division and a host in the manufacturing department of one their business partners, TheirCo.

Because the information these two companies share is highly confidential, it must be protected while it travels across the Internet. In addition, data must not flow in the clear within either company's networks because each network considers the other untrusted. In other words, both companies require end-to-end authentication, integrity, and encryption.

The VPN must protect all data traffic between the Human Resources department's subnet and the Finance department's subnet.
• Data traffic does not require VPN protection once it reaches either of the department's subnets.
• All clients and hosts on each network have full access to the other's network, including all applications.
• The gateway systems can communicate with each other and access each other's applications.

Details

The following figure illustrates the network characteristics of MyCo and TheirCo:

1381_figure.jpg

Figure-1: Sigma Inc. Office configuration

MyCo Supply Network
System A has an IP address of 10.6.1.1. This is the connection endpoint, as well as the data endpoint. That is, System A performs IKE negotiations and applies IPSec to incoming and outgoing IP datagrams and is also the source and destination for data that flows through the VPN.
System A is in subnet 10.6.0.0 with mask 255.255.0.0 Only System A can initiate the connection with System C.

TheirCo Manufacturing Network
System C has an IP address of 10.196.8.6. This is the connection endpoint, as well as the data endpoint. That is, System C performs IKE negotiations and applies IPSec to incoming and outgoing IP datagrams and is also the source and destination for data that flows through the VPN.

System C is in subnet 10.196.8.0 with mask 255.255.255.0

Configuration tasks
You must complete each of these tasks to configure the business to business connection described in this scenario:

Completing the planning worksheets
The planning checklists illustrate the type of information you need before you begin configuring the VPN. All answers on the prerequisite checklist must be YES before you proceed with VPN setup.

Configuring VPN on System A
Complete the following steps to configure a VPN connection on System A.

Configuring VPN on System C
Follow the same steps you used to configure VPN on System A, changing IP addresses as necessary. Use your planning worksheets for guidance.

Activating packet rules
The VPN wizard automatically creates the packet rules that this connection requires to work properly. However, you must activate them on both systems before you can start the VPN connection.

Starting a connection
After you have configured your VPN connection you need to start your VPN connection.

Testing a connection
After you finish configuring both systems and you have successfully started the VPN servers, test the connectivity to ensure that the remote subnets can communicate with each other

Part B: Presentation

The proposed network design will be presented in a 5-minute presentation during the week 12 Lab class. Presentation slides should be submitted in Moodle prior to the presentation for marking. No other options (hard copy, memory stick, website and email) will be considered but the presentation file submitted in Moodle. Marks will be given as below:
Presentation
Slides

Attachment:- Low-Level Design and Configuration of Lan.rar

Reference no: EM132304981

Questions Cloud

How does ernestos experience in the text and film : What "traveling" and "journeying" do you need to take in order to deepen your humanity? Include your external and internal traveling.
Inclusive working and learning environment : Briefly explain how would you provide an inclusive working and learning environment?
Why organisations should maintaining whs records : 1. Explain why organisations should maintaining WHS records?
Describing methods for conflict resolution : This activities is designed to actively involve you in various project management scenarios and help you apply the concepts to real-world situations.
Low-level design and configuration of lan : ME504 - Advanced Networking - Melbourne Institute of technology - Low-Level Design and Configuration of Lan/WAN network for an SME network
Provision of whs induction and training : 1. What are the benefits of the provision of WHS induction and training?
Explain why risk control plan is important : 1. To manage risk effectively, what issues that PCBUs needs to be aware of? 2. Explain why risk control plan is important in managing risks at workplace?
Identify and explain the hierarchy of control : 1. Identify the legal obligations on duty holders in managing health and safety risks in your home state or territory.
Develop a portfolio that showcases your experience : General Studies 420: Disability & Society- Develop a portfolio that showcases your experience through a disability culture plunge.

Reviews

len2304981

5/13/2019 11:51:53 PM

Grade Mark HD 80%+ Excellent Report Quality Very high quality report with detailed explanation of all the sections/steps of the activity covered Low Level Design All elements are present and well integrated. Screenshots and procedures (steps, commands, results) Clear and meaningful screen shots for the simulations presented with all the necessary captions Presentation and Slides Proper writing and drawings and slide professionally presented

len2304981

5/13/2019 11:51:46 PM

3 Screenshots and procedures (steps, commands, results) This section should include appropriate commands executed and results. There must be heading and steps with proper explanation, e.g. the purpose of the steps and expected outcome. 10 4 Analysis and Evaluation Include a section for results analysis and evaluate the outcome of the implementation of the network. Critical analysis and evaluation should be addressed. 5 TASK B Presentation and Slides Presentation (3 marks) Slides (2 marks) 5 Total 30

len2304981

5/13/2019 11:51:38 PM

TASK A No Categories Description Marks 1 Report Quality The document should include all necessary headings and content to depict a Level 2 (e.g. Ethernet, VPWS, VPLS) and Level 3 (e.g. VPRN) services and network design. It should not omit any necessary section to be used for network evaluation. 5 2 Low Level Design Multiple figures and tables should be included to show the requirements development. All sections need to be in line with the high-level design proposed in assignment 1. Any changes made should be addressed properly and clearly by ‘Change request’ section. 5

len2304981

5/13/2019 11:51:23 PM

All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of each page with appropriate section headings. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. MS WORD file type is used for submission in Moodle. No ‘zipped’ files or other types must be used.

Write a Review

Computer Networking Questions & Answers

  What is the router command used to configure a static route

What is the difference between a router's running-configuration and startup configuration?

  Describe possible lan topologies that could be used

Summarize the key considerations of the project, being sure to identify your chosen location. For example, what are the "must haves?" What are the constraints?

  Tcb subsets are said to leverage purely hierarchical

tcb subsets are said to leverage purely hierarchical domains ordered by privilege.explain the relation between these

  When should distance-vector routing be used and how do

question 1 when should distance-vector routing be used and how do distance-vector routing protocols work? can you

  How do you participate in the iot personally

How do you participate in the IoT personally? How do you think IPV6 will support the IoT, and what visions do think engineers should consider?

  Investigate capabilities and costs of an encryption package

Investigate the capabilities and costs of an encryption package. - Investigate the capabilities and costs of an online backup service.

  Describe network fundamental characteristics and component

Write a 2- to 4-page paper that includes the following based on your chosen Virtual Organization: Explain the network's fundamental characteristics and components

  1 examine the steps an organisation would take to establish

1. examine the steps an organisation would take to establish a pmo or po if it did not previously have one. explain

  The framing methods in slides

The sender program accepts two user inputs: the first input represents the selection of which framing method and the second one is the original data to transmit.

  Security protocols and policies of computers

ISCG 6404 INTERNET AND INTRANET - issues are commonly caused as a result of deficit in security protocols and policies of computers.

  Round-trip delay messages under protocol

Evaluate and explain whether or not a timer is required for round-trip delay messages under protocol RDT3, and under what conditions

  Use short answers to explain the difference including the

1.what are some of the reasons an organization might consider using a wireless lan?2.what type of security issues need

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd