Network design topology and configuration

Assignment Help Computer Networking
Reference no: EM132165377

CASE STUDY PROJECT PART - NETWORK DESIGN REPORT

Task

How can the network that you have implemented in part 2 of this Case study be optimized to improve performance. You report can analyse the following and justify the aspects that you consider are most appropriate:
- Possible changes to the network design topology and configuration
- Network devices from different vendors
- New routing features protocols e.g. other routing protocols
- New switching features e.g. VLANs, port security etc
- Other considerations

Word count: 800-1500 words

ASSESSMENT INSTRUCTIONS

- Teamwork for problem solving is encouraged - you may work together with other students outside of class time to find solutions to problems, review sources of information and learn from each other.
- The report must be your own original work so please write it in your own words.
o Give a copy of your notes or assignment work to other students
o Copy another students' work or copy chunks of text from the internet or other sources into your assignment - this is what we call "plagiarism" and is treated as "serious misconduct" which can result in failing the paper.
o Copy text from the internet and replace a few words or use word replacement software to rewrite it. It is obvious to tutors when you do this and is also treated as plagiarism
o Think that your tutor won't be able to tell if it is your work or not - we can
- DO
o Ensure that you keep backup copies of your work.
o Use correct APA referencing for all sources
o Learn how to correctly paraphrase and reference sources of information (see Student Learning Services for help)
o Use formal business English appropriate for an employer
o Write everything in your own words and reference the source of information

RESEARCH METHODS
You will need to do research to find the information to write the report.
- Ensure information is up to date - no more than a year old
- Use the internet and peer reviewed sources such as Google Scholar
- Use network engineering on-line chat sites
- Politely contact local providers (identify yourself as a student gathering data for an assignment)
- Look for network engineering journals and articlesCisco - Routing and Switching Essentials

CASE STUDY

Due Date: Assigned by Tutor

SECTION TOPIC

One Introduction and Cabling
Two Basic Configuration of the Network
Three Configure RIPng
Four DHCPv6 Stateful Configuration
Five IPv6 Static Routes
Six LLDP, Syslog and NTP
Seven IPV6 ACLs
Eight Clean Up

Objectives

Complete the following tasks:
- Assign addresses to interfaces and document them in the address table provided
- Cable the network according to the topology diagram
- Erase the startup configuration and reload routers and switch to the default state.
- Configure RIPng routing on all routers.
- Configure and propagate a default static route.
- Configure IPv6 Static Routes
- Verify RIPng operation.
- Perform security configuration on the switches.
- Configure Stateful DHCP
- Configure Stateless DHCP
- Design and apply an IPv6 ACL to restrict PC access to Web Server and VTY access
- Test and verify full connectivity

SECTION ONE

Introduction and Cabling

You are a network engineer for a company with multiple locations that are connected as shown above in the topology. In this assessment, you must design and assign address ranges and host addresses to accommodate all hosts and links on the network. RIPng and a static default route will be required so that hosts on networks not directly connected can communicate both internally within your network, and externally to the Web Server at 2001:DB8:ACAD::2. You have completed this assessment when each host can ping each other, and advanced routing and switching parameters are configured correctly.

Step 1.1:

Your instructor will assign you a public "Outside" IPv6 address for the GigabitEthernet interface of R1. It is:

You will be responsible for connecting this interface into the Public Switch (switchport number n).

Step 1.2:

You have been provided with the Routing Prefix 2001:(n)CAD:CAFE::/48. Subnet and address the devices with the appropriate Global IPv6 addresses and Link Local Addresses for R1, R2, R3, S1 and S2. PC1 will receive it's addressing via Stateful DHCP from R2 and PC2 will receive Stateless information from R3. Your Subnet ID field for each prefix must match the subnet number, for example the subnet field will be 1 for subnet one.

Step 1.3:

For each allocated router and switch, erase the configuration, reload the device, and ensure that the configuration register is set to 0x2102. For the two PCs, ensure they are set to obtain their IPv6 configuration automatically.
Now, using the appropriate cables, cable your topology as depicted in figure 1.

Section Two

Basic Configuration of the Network (10 marks)
Step 2.1:

Assign the correct IPv6 addresses for each router interface as calculated and planned for in the Tables above. It is advisable to disable IPV4 on PC 1 and PC 2.

Step 2.2:

On each router, apply the following:
- Disable DNS lookup
- A hostname that accurately reflects the name of the router.
- A domain name of wintecgang.com
- SSH service (1024 bit key, 4 retries, version 2, and a 110 second timeout).
- Local database entry (Username: cisco, Password: cisco)
- A encrypted privileged password of class
- A console password of cisco
- A login banner that warns the user not to enter unless authorised.
- Set the login block time to 10 seconds, with 2 attempts within 30 seconds.
- Ensure the console and vty logging is synchronous.
- Place meaningful descriptions on all router interfaces.
- For all DCE Serial interfaces, set a clock rate of 128 kbps.
- Ensure that access to the virtual terminal interfaces is only via SSH.
- Encrypt the plaintext passwords.
- Enable IPv6 routing
Step 2.3:

At router R1, configure a default route back to the ISP and specify Link Local address fe80::10 as the next hop address, and your directly connected interface Gi0/0. Make sure this static default route is a fully specified route otherwise it will not work.

SECTION THREE

Configure RIPng.

Step 3.1:

Configure RIPng on routers and router interfaces for R1, R2, and R3.
Advertise all directly connected networks, do not include the loopbacks on R3.
Do not advertise the Gi 0/0 interface of R1 (up to the ISP).

Step 3.2:

At R1, "propagate" the default route so that R2 and R3 receive this static route via RIP.

SECTION Four

DHCPv6 Stateful and Stateless Configuration

Step 4.1:

Configure R2 as a Stateful DHCPv6 Server for the Subnet 1 LAN
- Configure a DHCP pool called IPV6-STATEFUL
-
Configure the following pool parameters:
- DNS Server 2001:DB8:ACAD::2
- Domain-name wintecgang.com
Configure the DHCPv6 interface with the following:
- Bind the pool IPV6-STATEFUL to the Interface
- Change the M flag from 0 to 1 to use a DHCP Server only

Step 4.2:

Configure R3 as a Stateless DHCPv6 Server for the Subnet 2 LAN
In this option you are configuring the Router as Stateless and a DHCPv6 Server. The router in this instance will not provide host addresses, only IPV6 parameters such as DNS server address and domain-name.
- Configure a name for the DHCP Pool as IPV6-STATELESS
Configure Pool Parameters:
- DNS Server 2001:DB8:ACAD::2
- Domain-name wintecgang.com
Configure the DHCPv6 interface (G0/0):
- Bind the DHCPv6 pool IPV6-STATELESS to the interface G0/0
- Set the Stateless DHCPv6 Option flag M to 0 and O to 1

SECTION Five

IPv6 Static Routes (20 marks)

Step 5.1:

Configure static routes on R2 and R1 so that devices on LAN Subnet 1 and the Internet can reach the Loopback 6, 7 and 8 on R3.

Configure the static default route on R1 and propagate this to the other routers so that PC1 and PC2 can access the webserver. (Note this needs to be a fully specified route to the ISP router's interface)

Step 5.2:

Verify Connectivity
- Try to ping PC2 from PC1. Is it successful?
- Attempt to ping the Web Server at 2001:DB8:ACAD::2 from both PC1 and PC2. Is it successful?
- View the webpage on [2001:DB8:ACAD::2] from the PC1 and PC2 web-browser.

Step 5.3:

Look at the routing table at R3.
What entry was used by the PING conversation from PC2 to elicit a response from the Web Server at 2001:DB8:ACAD::2

SECTION SIX
Configure LLDP, Syslog and NTP
Instructions
- Configure LLDP on R2, R3, S1 and S2 LAN - check you can see LAN neighbors
- (Note LLDP will only work on the Ethernet links)
- Configure R1 to be an NTP Server with the current date and time (see the services tab)
- Configure R3, R2 to be NTP clients
- Check that R1, R2 and R3 have the same time as the Server (show clock)
- Configure the PC2 to be a Syslog server
- Configure R1, R2 and R3 to log messages to the syslog server
- Create and delete Lo0 on each router and check they are logging messages on the server

SECTION SEVEN

IPv6 Access Control Lists

Step 7.1:

Create an ACL such that all hosts on the Subnet 2 can NOT access the Web Server at 2001:DB8:ACAD::2 through the web-browser, however they can ping Webserver. The hosts on Subnet 1 should be able to access the Webserver. Where, and in what direction, did you place this ACL, and why?

Step 7.2:

Create an ACL such that only PCs on Subnet 1 can SSH into R1.
Any attempts to SSH into this device from R2, R3, S1, or PC2 will be rejected.

SECTION EIGHT

Clean Up:

Step 7.1:

Copy all the configurations and relevant show commands needed for your documentation
Erase all running configuration files off the routers and switch.
Erase the vlan.dat file from the switch.
Reset the PCs' TCP/IP protocol stacks to TCP/IP.
Disconnect and return all topology cables to the appropriate location.

Do not continue past this point until your examiner has signed your work.

Include the following screenshots for the relevant devices:
- Running configuration and routing tables for all routers
- Running configuration and VLAN settings for all switches
- IP config for all PCs as well as the following pings:
o PC1-webserver
o PC2-webserver
- Proof of SSH access to the routers and switches

Attachment:- Case study.zip

Reference no: EM132165377

Questions Cloud

What are the costs of this massive expansion : What are the costs of this massive expansion of information available to managers and other business users?
Managing ethical risk in the oil and gas industry : How does managing ethical risk in the oil and gas industry relate to reducing accidents?
Business tort and business contract concepts : Business tort and Business contract concepts - Analysis in relation to Business contract - Misrepresentation (Abid & Bashar)
Discuss a recent example of the use of genetic engineering : Discuss a recent example of the use of genetic engineering in the agricultural or medical fields.
Network design topology and configuration : COMP712 Routing and Switching Essentials - How can the network that you have implemented in part 2 of this Case study be optimized to improve performance
Describe the global importance of health : Describe the intervention to address this infectious disease, its cost-effectiveness, and impact.
Describe various fluid dynamics terminologies : Write an article review that includes a short summary of the article and your general thoughts about the article.
What are the applications in your daily life : What are the applications in your daily life? Provide your perspectives of its future development and applications.
Develop the current technological appliances in daily life : Democritus, Dalton, Thomson, Rutherford, and Bohr all had major accomplishments in uncovering the fundamental building blocks of matter.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd