Technical Detail Task Assignment | Essay Help Services

Instructions
Summarizing and Explaining Your Design

Summarize the site requirements and/or any challenges (changes to the topology as you detailed in assignments 1 and 2) you are attempting to overcome. You should also provide an updated overall site topology based on your design.

Don't use plagiarized sources. Get Your Custom Essay on
Technical Detail Task Assignment | Essay Help Services
For $10/Page 0nly
Order Essay

This solution should be comprehensive and the approach should be justified. Configurations of technologies should be written out to help guide the systems administrators with implementation. In some cases, you may find it necessary to implement additional cabling, which can be done by adding to the supplied topology. Any adjustments to the sites’ topology should be documented and supplied with your submission.

Use the Network Design Proposal Template to record your work. When you are finished, submit your final paper to the dropbox below.

Review the syllabus for information about late policies and resubmitted assignments.

Associated Learning Objectives
Learning Objective 2.3.1: Evaluate reliability, validity, accuracy, authority, timeliness, and point of view.
Assessment Method: Score on Criteria – 2.3: Evaluate the influence of context and assumptions on problem or issue.
Required Performance: C
Learning Objective 2.3.2: Evaluate the structure and logic of arguments and methods.
Assessment Method: Score on Criteria – 2.3: Evaluate the influence of context and assumptions on problem or issue.
Required Performance: C
Learning Objective 2.3.3: Select and incorporate information that provides evidence for the topic.
Assessment Method: Score on Criteria – 2.3: Evaluate the influence of context and assumptions on problem or issue.
Required Performance: C
Learning Objective 2.4.1: State well-reasoned conclusions or solutions clearly and precisely.
Assessment Method: Score on Criteria – 2.4: Formulate and support conclusions on a problem or issue.
Required Performance: C
Learning Objective 2.4.2: Evaluate assumptions underlying viewpoints, solutions, or conclusions.
Assessment Method: Score on Criteria – 2.4: Formulate and support conclusions on a problem or issue.
Required Performance: C
Learning Objective 2.4.3: Identify alternative viewpoints, perspectives, and methods and the basis of reasoning.
Assessment Method: Score on Criteria – 2.4: Formulate and support conclusions on a problem or issue.
Required Performance: C
Learning Objective 10.3.1.1: Configure Cisco devices on a network.
Assessment Method: Score on Criteria – 10.3.1: Use the Cisco IOS to configure and troubleshoot devices on the network.
Required Performance: C
Learning Objective 10.3.1.2: Troubleshoot Cisco devices on a network.
Assessment Method: Score on Criteria – 10.3.1: Use the Cisco IOS to configure and troubleshoot devices on the network.
Required Performance: C
Learning Objective 10.3.1.3: Use appropriate syntax to configure a device.
Assessment Method: Score on Criteria – 10.3.1: Use the Cisco IOS to configure and troubleshoot devices on the network.
Required Performance: C
Learning Objective 10.3.1.4: Use the “show run” command appropriately to verify the configuration.
Assessment Method: Score on Criteria – 10.3.1: Use the Cisco IOS to configure and troubleshoot devices on the network.
Required Performance: C
Learning Objective 11.1.2.1: Select an appropriate design.
Assessment Method: Score on Criteria – 11.1.2: Determine the most appropriate network topology design for an organization.
Required Performance: C
Learning Objective 11.1.2.2: Discuss advantages and disadvantages of selected design.
Assessment Method: Score on Criteria – 11.1.2: Determine the most appropriate network topology design for an organization.
Required Performance: C
Learning Objective 11.1.2.3: Explain why other topologies are not appropriate for this implementation.
Assessment Method: Score on Criteria – 11.1.2: Determine the most appropriate network topology design for an organization.
Required Performance: C
Learning Objective 11.1.3.1: Identify the layers of the OSI model.
Assessment Method: Score on Criteria – 11.1.3: Explain how network traffic operates at various layers of the OSI model.
Required Performance: C
Learning Objective 11.1.3.2: Differentiate the layers of the OSI model at which network devices operate.
Assessment Method: Score on Criteria – 11.1.3: Explain how network traffic operates at various layers of the OSI model.
Required Performance: C
Learning Objective 11.1.3.3: Differentiate the protocols of the OSI model at which network devices function.
Assessment Method: Score on Criteria – 11.1.3: Explain how network traffic operates at various layers of the OSI model.
Required Performance: C
Learning Objective 11.1.3.3: Differentiate the protocols of the OSI model at which network devices function.
Assessment Method: Score on Criteria – 11.1.3: Explain how network traffic operates at various layers of the OSI model.
Required Performance: C
Learning Objective 11.1.4.1: Identify TCP/IP protocols used on routers.
Assessment Method: Score on Criteria – 11.1.4: Differentiate various networking protocols within the TCP/IP protocol suite, including routing and switching protocols.
Required Performance: C
Learning Objective 11.1.4.2: Identify TCP/IP protocols used on switches.
Assessment Method: Score on Criteria – 11.1.4: Differentiate various networking protocols within the TCP/IP protocol suite, including routing and switching protocols.

Network Design

Part 1: Complete the Router Networking Tables

The routing table entries at the routing table at Orlando Site. The entries contain the network Id along with the subnet mask and Classless Inter-Domain Routing. The next part of the table includes the calculation of the valid host range and the broadcast for the subnet. The network needs more than 225 addresses to meet the current requirements. The class B address with /23 subnet mask provides 512 addresses. It meets the requirement of the future expansion of the network when required. The network bits are calculated using the number of zeros in the subnet mask. The number of ones in the subnet mask signifies the number of subnets that can be created. An IP address is represented in binary form or decimal form. In the binary form, the ones and zeros help in calculating the number of subnets and hosts. The

 

Net ID Usable Range Subnet Mask CIDR Value Broadcast
 173.16.0.0  173.16.0.1-

173.16.1.254

 255.255.254.0  /23  173.16.1.255
 173.16.2.0 173.16.2.1-

173.16.5.254

 255.255.254.0  /23  173.16.5.255
 173.16.4.0 173.16.4.1-

173.16.5.254

 255.255.254.0 /23 173.16.5.255

3

Table 3: Phoenix Site

Net ID Usable Range Subnet Mask CIDR Value Broadcast
173.16.6.0 173.16.6.1-

173.16.7.254

255.255.254.0 /23 173.16.7.255
173.16.8.0 173.16.8.1-

173.16.9.254

255.255.254.0 /23 173.16.9.255
173.16.10.0 173.16.10.1-

173.16.11.254

 255.255.254.0  /23 173.16.11.255
173.16.12.0 173.16.12.1-

173.16.13.254

255.255.254.0 /23 173.16.13.255
173.16.14.0 173.16.14.1-

173.16.15.254

 255.255.254.0  /23 173.16.15.255
173.16.16.0 173.16.16.1-

173.16.17.254

255.255.254.0 /23 173.16.17.255

 

Table 4: Toronto Site

Net ID Usable Range Subnet Mask CIDR Value Broadcast
173.16.18.0 173.16.18.1-

173.16.19.254

 255.255.254.0 /23 173.16.19.255
173.16.20.0 173.16.20.1-

173.16.21.254

255.255.254.0 /23 173.16.21.255
173.16.22.0 173.16.22.1-

173.16.23.254

 255.255.254.0  /23 173.16.23.255

 

 

Part 2: Design the Network Infrastructure

 

 

 

 

 

The list of devices used in the network topology:

Server: Every site contains a server for centralized administration of user rights and privileges in the network. A central server provides easy administration of the network for the network administrator.

Web Server: To reduce the workload on the central server. The Web server is created to handle the requests of web traffic on the network.

Primary Database Server: Database operations need quick response time for high performance and indexing features. A dedicated primary database server supports the database operations on the network.

Back up Database Server: It periodically keeps the data synchronized with the primary database server. It is very useful, in case of failure of the primary database server. The database operations are not affected due to back up the database server.

Switch: Switch functions at Layer 2 of the Open system Interconnect Model (OSI) model. It is used to break the network into collision domains. It is the responsibility of the switch to translate the hardware address into the logical address of the system and store the entries in the ARP table.

Router: Router functions at layer 3 of the OSI Model. It creates routing tables and finds the best path to send a packet to the destination in the network.

Firewall: It is used to implement a security check in the network. For example: if a company’s security policy denies using file uploading and downloading. It will block the port number 20 and 21. If any user requests, it will be rejected by the firewall on the network.

 

Start the router.

Settings at R1 at site 1, Orlando

Router>en

This command enables the router.

Router#config t

This command is used to enter the configuration mode for a terminal.

Router(config)#hostname R1

This command changes the hostname.

 

 

Assign IP address to fast ethernet interface

R1(config)#interface Fa0/0

The fast ethernet 0/0 ‘s configuration mode is enabled with this command.

R1(config-if)#ip address 173.16.0.0 255.255.254.0

This IP address is assigned along with subnet mask to interface fa0/0

R1(config-if)#no shutdown

This command opens the interface which is shut by default.

The status of the interface is changed to up.

R1(config-if)#exit

 

Assign an IP address to serial interface along with clock rate

 

R1(config)#interface Serial2/0

This command opens the serial 2/0 interface of the router.

R1(config-if)# IP address173.16.2.0 255.255.254.0

This command assigns the IP address with the subnet mask to the serial interface.

R1(config-if)#clock rate 64000 (Lammle,2014)

This command assigns the clock rate to the serial interface.

R1(config-if)#no shut

This command opens the interface which is shut by default.

 

The network requires more than 220 host addresses. Class C address with default subnet mask provides 254 addresses but no subnets. This network design requires a network divided into many subnets. The subnet mask of class B is used 255.255.254.0 with /23. /23 provides 512 host addresses per subnet.   Class B address ensures that the server at each site is connected using a switch. It is the implementation of star topology. All devices are connected to the central device. The routers are connected using the serial interface with clock rate to provide synchronization. The desktop and laptop are configured with the default gateway as the address of the router interface connected. It is recommended that the network must use Dynamic Host Configuration Protocol to assign IP addresses automatically to the nodes in the network. The DHCP server assigns an IP address from the pool of allotted IP addresses to the nodes in the network (Tannenbaum, 2003). At every site, the data passes through the firewall before sending it to the router. The local area network is monitored using the firewall before sending and receiving data on the network. Network security is enhanced by implementing access lists. Routers are configured using access lists to deny or permit traffic in the network (Kurose & Ross, 2017). Access lists can restrict the data transfer across the network based on incoming and outgoing data packets across the network. When data is transferred on the network, it first reaches the switch looks into its Address Resolution Protocol (ARP) table to translate Media Access Control address into IP address.  The switch transfers the packet to the firewall. The firewall examines the packets and decides whether to forward the packet or discard the packet. If the packet complies with the policies defined in the settings of the firewall, it is forwarded else it is dropped. Then the packet is transferred to the router. Then the router looks into its routing table to transfer packet onto the best path to the destination.

 

 

References:

  • Kurose, J., & Ross, K. (2017). Computer Networking. Harlow, United Kingdom: Pearson Education Limited.
  • Lammle, T. (2014). CCNA routing and switching review guide. Indianapolis, Ind.: J. Wiley & Sons.
  • Tannenbaum, A. (2003). Computer networks. New Dehli: Dorling Kindersley Pvt Ltd.

CMIT 350 Network Design Proposal

Use this document as a guide for formatting and organizing your CMIT 350 final Network Design Proposal submission.

Title Page

Professionalism will be key to your success and advancement in your academic and professional career. Use the title page to identify relevant information such as your name, the course, professor, and submission/completion date.

Document Index/Contents

Organization will allow your document to be divided into key areas of consideration and allows an overall structure to be placed over the submission.

Sample text:

  1. Site “XXXXXXXX” Challenges and Implementation
    II. Site “XXXXXXXX” Challenges and Implementation
    III. Site “XXXXXXXX” Challenges and Implementation
    IV. Bibliography
  2. Site “XXXXXXXXXX” Challenge and Implementation

(Provide a section for each site, as suggested in your table of contents.)

Site Details and Challenges (Summary)

Here, you will simply summarize the site requirements and/or challenges you are attempting to overcome. You will not need to implement solutions or discuss your approach at this point. This information is provided to you and can simply be organized and restated as you understand it. Think of this area as what needs to be corrected. Suggested length would be one or two paragraphs.

Sample text:

As described in the scenario, the Dallas site was developed without any VLAN structure, and administrators have found the need to isolate broadcast traffic from a layer-2 perspective.

Site Solution(s) and Technologies

With the challenges stated, you will be able to clearly define your approach to solving those challenges and can state the technologies you will be implementing. Use this area to justify your approach and selection of technologies. The specific length and details of this area will vary based on the specifics and depth of the challenge you are facing. Your justification would be your selection of a specific technology or approach over another and why you chose the approach you are taking. Show off your knowledge in the foundational skills here.

Sample text:

In order to relieve the administrative tasks surrounding the implementation of manual IP addressing per device, we will configure and implement a DHCP (dynamic host configuration protocol) server, per site requirements. The DHCP allows for devices to identify, request and implement IP configurations as well as other settings….

Since this area may call for facts and details around technologies and approaches, you will most likely find yourself using in-text citations, which would appear as follows:

Open Shortest Path First is an open standard routing protocol that’s been implemented by a wide variety of network vendors, including Cisco (Jones, 20xx).

Sample Configuration

Understanding the technologies will satisfy a portion of the documents’ requirements. You will also need to display how the solutions you are suggesting would be implemented.

Embed a copy of the PTK file for the Packet Tracer File you created.

Supporting Tables/Diagrams

When structuring solutions per certain sites, you may find it helpful or even necessary to structure information with tables and/or diagrams. These items can be used to support and display your understood solutions located in the “Site Solution(s) and Technologies” area. Display your organizational and logical skills in this area.

Provide an updated and polished network design diagram (Assignment 1 updated).

Repeat the format to include document components for each site. In this sample, sections numbered II and III in your table of contents would be provided next, followed by the bibliography.

  1. Bibliography

Be responsible with your research and included works. Provide proper credit in the APA format to original authors and their works that you leverage in your submission.

 

Calculator

Calculate the price of your paper

Total price:$26

Need a better grade?
We've got you covered.

Order your paper