Outline your entire network design process

Assignment Help Computer Networking
Reference no: EM133825717 , Length: word count:1500

Introduction to Information Networks

Assessment - Network Design and Implementation Project

Learning Outcome 1: Evaluate the main technologies, models and protocols used in data communications and networking.

Learning Outcome 2: Explain the purpose and functionality of layered computer network models.

Learning Outcome 3: Identify problems that emerge among the networks that constitute today's internet architecture.

Your Task

This assessment challenges you to apply theoretical concepts from your course to a practical network design and simulation project. You are expected to create a comprehensive network using Cisco Packet Tracer, a network simulation software. This project will test your ability to integrate knowledge across several networking domains, including network layer models, addressing and routing, transport layer protocols, wireless networking, network security, and Quality of Service (QoS).

Assessment Description

Part 1. Network Design Documentation

Purpose: To outline your entire network design process, from inception to implementation. This document will serve as a comprehensive blueprint of your network, detailing each decision and its justification.

Content: o Introduction: Describe the purpose and expected outcomes of the network.
o Design Choices: Discuss the selection of network models (OSI or TCP/IP layers) and their suitability for your scenario.
o Addressing Scheme: Provide a detailed IP addressing plan.
o Routing Protocols: Detail which routing protocols (e.g., RIP, OSPF, BGP) are used and the rationale behind their selection.
o Network Security Measures: Outline the security protocols (e.g., firewalls, VPNs) to protect the network.
o Quality of Service (QoS): Explain your strategy for managing network traffic and ensuring quality of service.
o Simulation Outline: Describe what will be demonstrated in the Cisco Packet Tracer simulation. You must use the Network Scenario Generators: Custom GPT: Network Scenario Generator (link) to assist in generating and refining your network scenario. This tool is integral to creating realistic and challenging network environments for simulation.

Part 2. Network Simulation
Purpose: To practically implement and troubleshoot your network design in a simulated environment using Cisco Packet Tracer.
Setup Requirements:
~ Network Construction: Construct a network that includes:
o Three Routers: Configured to manage traffic between different network segments. o Three Switches: Connecting devices within the same network segment.
o Wireless Devices: Implement wireless access points as studied in Weeks 7 - 9.
o Three Hosts: Devices (e.g., PCs) that generate and receive traffic.
o One Rogue Device: Simulate security threats using a rogue laptop.

o Modules: Include HWIC-2T (two-port serial high-speed WAN) modules in routers as part of Week 7-9's workshop.
~ Naming Convention: The first router should be named using your first name (e.g.,
Router_John) and the second router with your last name (e.g., Router_Doe).
Suggested IP Address Table:
For students new to subnetting, here is a suggested IP address table. These IP addresses are recommendations, and you can modify them based on your network scenario. Alternatively, use the Network Scenario Generators Custom GPT (link) to generate other valid IP address schemes.
This table uses placeholders for Network A to indicate that specific IP addresses will be allocated from the unique list provided by the facilitator.

Device

Interface

Network

IP Address

Subnet Mask

Default Gateway

Router_[Your_First_Name]

Fa0/0

Network A

192.168.1.XX

255.255.255.0

N/A

Router_[Your_Last_Name]

Fa0/0

Network B

192.168.2.1

255.255.255.0

N/A

Router_[Student_ID]

Fa0/0

Network C

192.168.3.1

255.255.255.0

N/A

Switch 1

Network A

 

192.168.1.XX

255.255.255.0

192.168.1.XX

Switch 2

Network B

 

192.168.2.2

255.255.255.0

192.168.2.1

Switch 3

Network C

 

192.168.3.2

255.255.255.0

192.168.3.1

PC-A

NIC

Network A

192.168.1.XX

255.255.255.0

192.168.1.XX

PC-B

NIC

Network B

192.168.2.10

255.255.255.0

192.168.2.1

PC-C

NIC

Network C

192.168.3.10

255.255.255.0

192.168.3.1

Access Point 1

Network A

 

192.168.1.XX

255.255.255.0

192.168.1.XX

Access Point 2

Network B

 

192.168.2.20

255.255.255.0

192.168.2.1

Rogue Laptop

Wireless

 

192.168.4.50

255.255.255.0

192.168.4.1

Notes:
"XX" in IP addresses for Network A indicates that specific IPs will be provided to each student from the unique list of IPs during Week 12 to ensure individual configurations. Need Help for Assessment: Get Now!!
Router Naming: Replace Router_[Your_First_Name] and Router_[Your_Last_Name] with
your actual first and last names as specified in the assessment.
Network C: This network can be an additional segment if you want to simulate more advanced configurations or connect additional departments/locations.
Wireless Configuration: Access Points should have their own IP addresses within the respective network segments, and security settings (WPA2) should be configured for wireless access.
Configuration and Testing:
Router and Switch Configuration: Configure router interfaces and switch ports based on the addressing table above. Ensure all interfaces are enabled, and IP addressing is correctly set up.
Wireless Network Settings: Integrate wireless access points by configuring SSID, authentication, and performance metrics (signal strength, throughput).
Port Security: Configure port security on switches to restrict unauthorised access. Ensure port security is blocking rogue traffic while allowing legitimate devices to connect.
Testing and Verification: Use ping and diagnostic commands to test connectivity between devices and ensure smooth communication between routers, switches, and wireless devices.

3. In-Class Delivery
Purpose: To comprehensively articulate the process, decisions, and outcomes of your network design and simulation.
Format: Present your project to your facilitator in-class during Week 12, detailing the network design and simulation stages.
o Introduction: Discuss the project scope and objectives.
o Walk-through: Explain the network design in detail.
o Demonstration: Highlight key functionalities within the simulation.
o Challenges and Resolutions: Discuss any challenges faced and their resolutions. o Conclusion: Suggest potential improvements or future network expansions.

Part 1 - Network Design Documentation

No practical implementation is needed for this part.

As outlined in the assessment instructions, this section requires you to document the entire network design process, from inception to implementation. This document serves as a comprehensive blueprint of your network, detailing each decision and its justification.
You must cover all required aspects, including but not limited to:
Routing Protocols: The selection and justification of protocols like RIP, OSPF, or BGP.
Network Security Measures: Security protocols such as firewalls or VPNs to protect the network.
Quality of Service (QoS): Your strategy for managing network traffic and ensuring service quality.
Please review the detailed requirements in Part 1 of the assessment instructions. These topics have been thoroughly explained by your lecturer during the course, and you are expected to apply them accordingly.

Part 2 - Network Simulation (Cisco Packet Tracer)
No documentation or screenshots are require(
for this part unless you choose to include them.
This part focuses on the practical implementation of your network design in Cisco Packet Tracer.
Focus only on the requirements stated in the assessment - no additional tasks such as firewalls or VPNs are needed.
All the requirements in Part 2 have already been implemented by you during this semester, including concepts such as wireless networking and security measures. Apply these concepts as you have done previously.
Technical Explanation about Access Points (APs) Functionality
Access Points (APs) are Layer 2 devices (Data Link Layer) and primarily handle wireless traffic bridging between clients and the wired network.
IP addresses are Layer 3 (Network Layer) configurations, typically assigned to routers, switches (via SVIs), or end devices (e.g., PCs).
Cisco Packet Tracer Behavior:
Standalone APs (e.g., "Access Point-PT" or "Wireless Access Point-PT" in Packet Tracer) do not support direct IP address
assignment on their interfaces.
In real-world scenarios, management IPs can be assigned to APs for remote administration. However, Packet Tracer simplifies this by abstracting Layer 3 configurations to connected switches or routers.
Solution: Please ignore the IP address
assignment for the Access Points and
simply connect them to the network SSID
as you did previously in Week 7.

Delivery
No formal presentation is required due to time constraints.
The delivery will be 1-on-1, during which you will provide a 5-minute overview covering:
Testing of the Simulation: Demonstrate that the Cisco Packet Tracer network setup functions as expected.
Network Architecture Rationale: Explain the reasoning behind your network design choices.
The lecturer may ask various questions to probe deeper into your understanding and to adequately

Reference no: EM133825717

Questions Cloud

Defined job limits : When are followers more likely to become part of the in-group? when they create a network of peer relations when they stay within defined job limits
Decide how to allocate resources within firm : Tom leads a team at Empire Holdings. The team's responsibilities are to develop courses of action that decide how to allocate resources within a firm
Describe the criteria for inclusion and exclusion : Present the most current version of your research question and state the phenomenon of interest. Describe the criteria for inclusion and exclusion.
Explain the key aspects of effective advertising campaign : Write a 4 pages paper explaining the key aspects of an effective advertising campaign. This problem may be used as part of your Marketing Plan.
Outline your entire network design process : outline your entire network design process, from inception to implementation. This document will serve as a comprehensive blueprint of your network
Discuss any limitations associated with use of instrument : Discuss the psychometrics/scoring of the instrument, including reliability and validity. Discuss any limitations associated with the use of the instrument.
Challenges of implementing treatment on volunteer basis : What is reentry, its goal, challenges of implementing treatment on a volunteer basis?
Some characteristics of performance based budget : Some characteristics of a performance based budget are the rewards are based off the performance.
What are the main components of trauma-informed care : What are main components of trauma-informed care? Why ACEs model of screening is so important in primary care and psychiatric mental health care for patients?

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd