Network design topology and configuration

Assignment Help Computer Networking
Reference no: EM132165377

CASE STUDY PROJECT PART - NETWORK DESIGN REPORT

Task

How can the network that you have implemented in part 2 of this Case study be optimized to improve performance. You report can analyse the following and justify the aspects that you consider are most appropriate:
- Possible changes to the network design topology and configuration
- Network devices from different vendors
- New routing features protocols e.g. other routing protocols
- New switching features e.g. VLANs, port security etc
- Other considerations

Word count: 800-1500 words

ASSESSMENT INSTRUCTIONS

- Teamwork for problem solving is encouraged - you may work together with other students outside of class time to find solutions to problems, review sources of information and learn from each other.
- The report must be your own original work so please write it in your own words.
o Give a copy of your notes or assignment work to other students
o Copy another students' work or copy chunks of text from the internet or other sources into your assignment - this is what we call "plagiarism" and is treated as "serious misconduct" which can result in failing the paper.
o Copy text from the internet and replace a few words or use word replacement software to rewrite it. It is obvious to tutors when you do this and is also treated as plagiarism
o Think that your tutor won't be able to tell if it is your work or not - we can
- DO
o Ensure that you keep backup copies of your work.
o Use correct APA referencing for all sources
o Learn how to correctly paraphrase and reference sources of information (see Student Learning Services for help)
o Use formal business English appropriate for an employer
o Write everything in your own words and reference the source of information

RESEARCH METHODS
You will need to do research to find the information to write the report.
- Ensure information is up to date - no more than a year old
- Use the internet and peer reviewed sources such as Google Scholar
- Use network engineering on-line chat sites
- Politely contact local providers (identify yourself as a student gathering data for an assignment)
- Look for network engineering journals and articlesCisco - Routing and Switching Essentials

CASE STUDY

Due Date: Assigned by Tutor

SECTION TOPIC

One Introduction and Cabling
Two Basic Configuration of the Network
Three Configure RIPng
Four DHCPv6 Stateful Configuration
Five IPv6 Static Routes
Six LLDP, Syslog and NTP
Seven IPV6 ACLs
Eight Clean Up

Objectives

Complete the following tasks:
- Assign addresses to interfaces and document them in the address table provided
- Cable the network according to the topology diagram
- Erase the startup configuration and reload routers and switch to the default state.
- Configure RIPng routing on all routers.
- Configure and propagate a default static route.
- Configure IPv6 Static Routes
- Verify RIPng operation.
- Perform security configuration on the switches.
- Configure Stateful DHCP
- Configure Stateless DHCP
- Design and apply an IPv6 ACL to restrict PC access to Web Server and VTY access
- Test and verify full connectivity

SECTION ONE

Introduction and Cabling

You are a network engineer for a company with multiple locations that are connected as shown above in the topology. In this assessment, you must design and assign address ranges and host addresses to accommodate all hosts and links on the network. RIPng and a static default route will be required so that hosts on networks not directly connected can communicate both internally within your network, and externally to the Web Server at 2001:DB8:ACAD::2. You have completed this assessment when each host can ping each other, and advanced routing and switching parameters are configured correctly.

Step 1.1:

Your instructor will assign you a public "Outside" IPv6 address for the GigabitEthernet interface of R1. It is:

You will be responsible for connecting this interface into the Public Switch (switchport number n).

Step 1.2:

You have been provided with the Routing Prefix 2001:(n)CAD:CAFE::/48. Subnet and address the devices with the appropriate Global IPv6 addresses and Link Local Addresses for R1, R2, R3, S1 and S2. PC1 will receive it's addressing via Stateful DHCP from R2 and PC2 will receive Stateless information from R3. Your Subnet ID field for each prefix must match the subnet number, for example the subnet field will be 1 for subnet one.

Step 1.3:

For each allocated router and switch, erase the configuration, reload the device, and ensure that the configuration register is set to 0x2102. For the two PCs, ensure they are set to obtain their IPv6 configuration automatically.
Now, using the appropriate cables, cable your topology as depicted in figure 1.

Section Two

Basic Configuration of the Network (10 marks)
Step 2.1:

Assign the correct IPv6 addresses for each router interface as calculated and planned for in the Tables above. It is advisable to disable IPV4 on PC 1 and PC 2.

Step 2.2:

On each router, apply the following:
- Disable DNS lookup
- A hostname that accurately reflects the name of the router.
- A domain name of wintecgang.com
- SSH service (1024 bit key, 4 retries, version 2, and a 110 second timeout).
- Local database entry (Username: cisco, Password: cisco)
- A encrypted privileged password of class
- A console password of cisco
- A login banner that warns the user not to enter unless authorised.
- Set the login block time to 10 seconds, with 2 attempts within 30 seconds.
- Ensure the console and vty logging is synchronous.
- Place meaningful descriptions on all router interfaces.
- For all DCE Serial interfaces, set a clock rate of 128 kbps.
- Ensure that access to the virtual terminal interfaces is only via SSH.
- Encrypt the plaintext passwords.
- Enable IPv6 routing
Step 2.3:

At router R1, configure a default route back to the ISP and specify Link Local address fe80::10 as the next hop address, and your directly connected interface Gi0/0. Make sure this static default route is a fully specified route otherwise it will not work.

SECTION THREE

Configure RIPng.

Step 3.1:

Configure RIPng on routers and router interfaces for R1, R2, and R3.
Advertise all directly connected networks, do not include the loopbacks on R3.
Do not advertise the Gi 0/0 interface of R1 (up to the ISP).

Step 3.2:

At R1, "propagate" the default route so that R2 and R3 receive this static route via RIP.

SECTION Four

DHCPv6 Stateful and Stateless Configuration

Step 4.1:

Configure R2 as a Stateful DHCPv6 Server for the Subnet 1 LAN
- Configure a DHCP pool called IPV6-STATEFUL
-
Configure the following pool parameters:
- DNS Server 2001:DB8:ACAD::2
- Domain-name wintecgang.com
Configure the DHCPv6 interface with the following:
- Bind the pool IPV6-STATEFUL to the Interface
- Change the M flag from 0 to 1 to use a DHCP Server only

Step 4.2:

Configure R3 as a Stateless DHCPv6 Server for the Subnet 2 LAN
In this option you are configuring the Router as Stateless and a DHCPv6 Server. The router in this instance will not provide host addresses, only IPV6 parameters such as DNS server address and domain-name.
- Configure a name for the DHCP Pool as IPV6-STATELESS
Configure Pool Parameters:
- DNS Server 2001:DB8:ACAD::2
- Domain-name wintecgang.com
Configure the DHCPv6 interface (G0/0):
- Bind the DHCPv6 pool IPV6-STATELESS to the interface G0/0
- Set the Stateless DHCPv6 Option flag M to 0 and O to 1

SECTION Five

IPv6 Static Routes (20 marks)

Step 5.1:

Configure static routes on R2 and R1 so that devices on LAN Subnet 1 and the Internet can reach the Loopback 6, 7 and 8 on R3.

Configure the static default route on R1 and propagate this to the other routers so that PC1 and PC2 can access the webserver. (Note this needs to be a fully specified route to the ISP router's interface)

Step 5.2:

Verify Connectivity
- Try to ping PC2 from PC1. Is it successful?
- Attempt to ping the Web Server at 2001:DB8:ACAD::2 from both PC1 and PC2. Is it successful?
- View the webpage on [2001:DB8:ACAD::2] from the PC1 and PC2 web-browser.

Step 5.3:

Look at the routing table at R3.
What entry was used by the PING conversation from PC2 to elicit a response from the Web Server at 2001:DB8:ACAD::2

SECTION SIX
Configure LLDP, Syslog and NTP
Instructions
- Configure LLDP on R2, R3, S1 and S2 LAN - check you can see LAN neighbors
- (Note LLDP will only work on the Ethernet links)
- Configure R1 to be an NTP Server with the current date and time (see the services tab)
- Configure R3, R2 to be NTP clients
- Check that R1, R2 and R3 have the same time as the Server (show clock)
- Configure the PC2 to be a Syslog server
- Configure R1, R2 and R3 to log messages to the syslog server
- Create and delete Lo0 on each router and check they are logging messages on the server

SECTION SEVEN

IPv6 Access Control Lists

Step 7.1:

Create an ACL such that all hosts on the Subnet 2 can NOT access the Web Server at 2001:DB8:ACAD::2 through the web-browser, however they can ping Webserver. The hosts on Subnet 1 should be able to access the Webserver. Where, and in what direction, did you place this ACL, and why?

Step 7.2:

Create an ACL such that only PCs on Subnet 1 can SSH into R1.
Any attempts to SSH into this device from R2, R3, S1, or PC2 will be rejected.

SECTION EIGHT

Clean Up:

Step 7.1:

Copy all the configurations and relevant show commands needed for your documentation
Erase all running configuration files off the routers and switch.
Erase the vlan.dat file from the switch.
Reset the PCs' TCP/IP protocol stacks to TCP/IP.
Disconnect and return all topology cables to the appropriate location.

Do not continue past this point until your examiner has signed your work.

Include the following screenshots for the relevant devices:
- Running configuration and routing tables for all routers
- Running configuration and VLAN settings for all switches
- IP config for all PCs as well as the following pings:
o PC1-webserver
o PC2-webserver
- Proof of SSH access to the routers and switches

Attachment:- Case study.zip

Reference no: EM132165377

Questions Cloud

What are the costs of this massive expansion : What are the costs of this massive expansion of information available to managers and other business users?
Managing ethical risk in the oil and gas industry : How does managing ethical risk in the oil and gas industry relate to reducing accidents?
Business tort and business contract concepts : Business tort and Business contract concepts - Analysis in relation to Business contract - Misrepresentation (Abid & Bashar)
Discuss a recent example of the use of genetic engineering : Discuss a recent example of the use of genetic engineering in the agricultural or medical fields.
Network design topology and configuration : COMP712 Routing and Switching Essentials - How can the network that you have implemented in part 2 of this Case study be optimized to improve performance
Describe the global importance of health : Describe the intervention to address this infectious disease, its cost-effectiveness, and impact.
Describe various fluid dynamics terminologies : Write an article review that includes a short summary of the article and your general thoughts about the article.
What are the applications in your daily life : What are the applications in your daily life? Provide your perspectives of its future development and applications.
Develop the current technological appliances in daily life : Democritus, Dalton, Thomson, Rutherford, and Bohr all had major accomplishments in uncovering the fundamental building blocks of matter.

Reviews

Write a Review

Computer Networking Questions & Answers

  Define the network topology that will be used

Part 1 - Network Design - Define the network topology that will be used and justify the decision. Student should be specific when discussing the models

  Introduction to modems

Digital communication has proved to be very efficient means of transporting speech, music, videos and data over different kinds of media. These media include satellite, microwave, fiber-optic, coaxial and cellular channels.

  What is the purpose of a logical fiber map

What are the typical maximum lengths for (a) multimode and (b) single-mode fiber?

  Question 1aname five significant activities involved in a

question 1aname five significant activities involved in a digital forensic investigation.bwhy is computer forensic

  Does vc or datagram architecture have more traffic overhead

Suppose that the links and routers in the network never fail and that routing paths used between all source/destination pairs remains constant. In this scenario, does a VC or datagram architecture have more traffic overhead. Why?

  Reason for networking an organization''s computers together

What is the Health Insurance Portability and Accountability Act (HIPAA)? Support your answer with an example of a violation of this act by an organization (or of an individual within an organization).

  What is the maximum overhead in byte-stuffing algorithm

What is the maximum overhead in byte-stuffing algorithm? What is the minimum overhead to send an IP packet using PPP

  Write paper that includes security concerns for enterprise

Write a 2 to 3-page paper that includes the Security concerns for the enterprise, suggestions for additional information to be documented with examples and consideration of network bandwidth capacity considerations in the design documents.

  Attacks on servers on one of company-s departments

After reading about attacks on servers like to ones used in one of company's departments, the CIO has asked you to come up with a report as to what.

  Design a protocol to allow mobile user to securely download

Design and explain (with diagrammatical illustration) a protocol to allow the mobile user to securely download his/her fingerprint related data from the server of the user's service provider to his/her mobile phone

  Brief details of the school chosen including its floor plan

Introduction that will include the brief details of the school chosen including its floor plan to cater for its ICT requirements, its ICT requirements emphasizing the networking and data communications, and the challenges for the solution(s).

  Reserved route takes over when device or connection fails

It determines new tree topology when switch or cable link failures. Reserved route takes over when device or connection fails. To aggregate ....to gather together Which is better, 10x100Mbps or 1Gbps?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd