Instructions
Summarizing and Explaining Your Design
Summarize the site requirements and/or any challenges (changes to the topology as you detailed in assignments 1 and 2) you are attempting to overcome. You should also provide an updated overall site topology based on your design.
This solution should be comprehensive and the approach should be justified. Configurations of technologies should be written out to help guide the systems administrators with implementation. In some cases, you may find it necessary to implement additional cabling, which can be done by adding to the supplied topology. Any adjustments to the sites’ topology should be documented and supplied with your submission.
Use the Network Design Proposal Template to record your work. When you are finished, submit your final paper to the dropbox below.
Review the syllabus for information about late policies and resubmitted assignments.
Associated Learning Objectives
Learning Objective 2.3.1: Evaluate reliability, validity, accuracy, authority, timeliness, and point of view.
Assessment Method: Score on Criteria – 2.3: Evaluate the influence of context and assumptions on problem or issue.
Required Performance: C
Learning Objective 2.3.2: Evaluate the structure and logic of arguments and methods.
Assessment Method: Score on Criteria – 2.3: Evaluate the influence of context and assumptions on problem or issue.
Required Performance: C
Learning Objective 2.3.3: Select and incorporate information that provides evidence for the topic.
Assessment Method: Score on Criteria – 2.3: Evaluate the influence of context and assumptions on problem or issue.
Required Performance: C
Learning Objective 2.4.1: State well-reasoned conclusions or solutions clearly and precisely.
Assessment Method: Score on Criteria – 2.4: Formulate and support conclusions on a problem or issue.
Required Performance: C
Learning Objective 2.4.2: Evaluate assumptions underlying viewpoints, solutions, or conclusions.
Assessment Method: Score on Criteria – 2.4: Formulate and support conclusions on a problem or issue.
Required Performance: C
Learning Objective 2.4.3: Identify alternative viewpoints, perspectives, and methods and the basis of reasoning.
Assessment Method: Score on Criteria – 2.4: Formulate and support conclusions on a problem or issue.
Required Performance: C
Learning Objective 10.3.1.1: Configure Cisco devices on a network.
Assessment Method: Score on Criteria – 10.3.1: Use the Cisco IOS to configure and troubleshoot devices on the network.
Required Performance: C
Learning Objective 10.3.1.2: Troubleshoot Cisco devices on a network.
Assessment Method: Score on Criteria – 10.3.1: Use the Cisco IOS to configure and troubleshoot devices on the network.
Required Performance: C
Learning Objective 10.3.1.3: Use appropriate syntax to configure a device.
Assessment Method: Score on Criteria – 10.3.1: Use the Cisco IOS to configure and troubleshoot devices on the network.
Required Performance: C
Learning Objective 10.3.1.4: Use the “show run” command appropriately to verify the configuration.
Assessment Method: Score on Criteria – 10.3.1: Use the Cisco IOS to configure and troubleshoot devices on the network.
Required Performance: C
Learning Objective 11.1.2.1: Select an appropriate design.
Assessment Method: Score on Criteria – 11.1.2: Determine the most appropriate network topology design for an organization.
Required Performance: C
Learning Objective 11.1.2.2: Discuss advantages and disadvantages of selected design.
Assessment Method: Score on Criteria – 11.1.2: Determine the most appropriate network topology design for an organization.
Required Performance: C
Learning Objective 11.1.2.3: Explain why other topologies are not appropriate for this implementation.
Assessment Method: Score on Criteria – 11.1.2: Determine the most appropriate network topology design for an organization.
Required Performance: C
Learning Objective 11.1.3.1: Identify the layers of the OSI model.
Assessment Method: Score on Criteria – 11.1.3: Explain how network traffic operates at various layers of the OSI model.
Required Performance: C
Learning Objective 11.1.3.2: Differentiate the layers of the OSI model at which network devices operate.
Assessment Method: Score on Criteria – 11.1.3: Explain how network traffic operates at various layers of the OSI model.
Required Performance: C
Learning Objective 11.1.3.3: Differentiate the protocols of the OSI model at which network devices function.
Assessment Method: Score on Criteria – 11.1.3: Explain how network traffic operates at various layers of the OSI model.
Required Performance: C
Learning Objective 11.1.3.3: Differentiate the protocols of the OSI model at which network devices function.
Assessment Method: Score on Criteria – 11.1.3: Explain how network traffic operates at various layers of the OSI model.
Required Performance: C
Learning Objective 11.1.4.1: Identify TCP/IP protocols used on routers.
Assessment Method: Score on Criteria – 11.1.4: Differentiate various networking protocols within the TCP/IP protocol suite, including routing and switching protocols.
Required Performance: C
Learning Objective 11.1.4.2: Identify TCP/IP protocols used on switches.
Assessment Method: Score on Criteria – 11.1.4: Differentiate various networking protocols within the TCP/IP protocol suite, including routing and switching protocols.
The routing table entries at the routing table at Orlando Site. The entries contain the network Id along with the subnet mask and Classless Inter-Domain Routing. The next part of the table includes the calculation of the valid host range and the broadcast for the subnet. The network needs more than 225 addresses to meet the current requirements. The class B address with /23 subnet mask provides 512 addresses. It meets the requirement of the future expansion of the network when required. The network bits are calculated using the number of zeros in the subnet mask. The number of ones in the subnet mask signifies the number of subnets that can be created. An IP address is represented in binary form or decimal form. In the binary form, the ones and zeros help in calculating the number of subnets and hosts. The
| Net ID | Usable Range | Subnet Mask | CIDR Value | Broadcast |
| 173.16.0.0 | 173.16.0.1- 173.16.1.254 | 255.255.254.0 | /23 | 173.16.1.255 |
| 173.16.2.0 | 173.16.2.1- 173.16.5.254 | 255.255.254.0 | /23 | 173.16.5.255 |
| 173.16.4.0 | 173.16.4.1- 173.16.5.254 | 255.255.254.0 | /23 | 173.16.5.255 |
3
Table 3: Phoenix Site
| Net ID | Usable Range | Subnet Mask | CIDR Value | Broadcast |
| 173.16.6.0 | 173.16.6.1- 173.16.7.254 | 255.255.254.0 | /23 | 173.16.7.255 |
| 173.16.8.0 | 173.16.8.1- 173.16.9.254 | 255.255.254.0 | /23 | 173.16.9.255 |
| 173.16.10.0 | 173.16.10.1- 173.16.11.254 | 255.255.254.0 | /23 | 173.16.11.255 |
| 173.16.12.0 | 173.16.12.1- 173.16.13.254 | 255.255.254.0 | /23 | 173.16.13.255 |
| 173.16.14.0 | 173.16.14.1- 173.16.15.254 | 255.255.254.0 | /23 | 173.16.15.255 |
| 173.16.16.0 | 173.16.16.1- 173.16.17.254 | 255.255.254.0 | /23 | 173.16.17.255 |
Table 4: Toronto Site
| Net ID | Usable Range | Subnet Mask | CIDR Value | Broadcast |
| 173.16.18.0 | 173.16.18.1- 173.16.19.254 | 255.255.254.0 | /23 | 173.16.19.255 |
| 173.16.20.0 | 173.16.20.1- 173.16.21.254 | 255.255.254.0 | /23 | 173.16.21.255 |
| 173.16.22.0 | 173.16.22.1- 173.16.23.254 | 255.255.254.0 | /23 | 173.16.23.255 |
The list of devices used in the network topology:
Server: Every site contains a server for centralized administration of user rights and privileges in the network. A central server provides easy administration of the network for the network administrator.
Web Server: To reduce the workload on the central server. The Web server is created to handle the requests of web traffic on the network.
Primary Database Server: Database operations need quick response time for high performance and indexing features. A dedicated primary database server supports the database operations on the network.
Back up Database Server: It periodically keeps the data synchronized with the primary database server. It is very useful, in case of failure of the primary database server. The database operations are not affected due to back up the database server.
Switch: Switch functions at Layer 2 of the Open system Interconnect Model (OSI) model. It is used to break the network into collision domains. It is the responsibility of the switch to translate the hardware address into the logical address of the system and store the entries in the ARP table.
Router: Router functions at layer 3 of the OSI Model. It creates routing tables and finds the best path to send a packet to the destination in the network.
Firewall: It is used to implement a security check in the network. For example: if a company’s security policy denies using file uploading and downloading. It will block the port number 20 and 21. If any user requests, it will be rejected by the firewall on the network.
Start the router.
Settings at R1 at site 1, Orlando
Router>en
This command enables the router.
Router#config t
This command is used to enter the configuration mode for a terminal.
Router(config)#hostname R1
This command changes the hostname.
Assign IP address to fast ethernet interface
R1(config)#interface Fa0/0
The fast ethernet 0/0 ‘s configuration mode is enabled with this command.
R1(config-if)#ip address 173.16.0.0 255.255.254.0
This IP address is assigned along with subnet mask to interface fa0/0
R1(config-if)#no shutdown
This command opens the interface which is shut by default.
The status of the interface is changed to up.
R1(config-if)#exit
Assign an IP address to serial interface along with clock rate
R1(config)#interface Serial2/0
This command opens the serial 2/0 interface of the router.
R1(config-if)# IP address173.16.2.0 255.255.254.0
This command assigns the IP address with the subnet mask to the serial interface.
R1(config-if)#clock rate 64000 (Lammle,2014)
This command assigns the clock rate to the serial interface.
R1(config-if)#no shut
This command opens the interface which is shut by default.
The network requires more than 220 host addresses. Class C address with default subnet mask provides 254 addresses but no subnets. This network design requires a network divided into many subnets. The subnet mask of class B is used 255.255.254.0 with /23. /23 provides 512 host addresses per subnet. Class B address ensures that the server at each site is connected using a switch. It is the implementation of star topology. All devices are connected to the central device. The routers are connected using the serial interface with clock rate to provide synchronization. The desktop and laptop are configured with the default gateway as the address of the router interface connected. It is recommended that the network must use Dynamic Host Configuration Protocol to assign IP addresses automatically to the nodes in the network. The DHCP server assigns an IP address from the pool of allotted IP addresses to the nodes in the network (Tannenbaum, 2003). At every site, the data passes through the firewall before sending it to the router. The local area network is monitored using the firewall before sending and receiving data on the network. Network security is enhanced by implementing access lists. Routers are configured using access lists to deny or permit traffic in the network (Kurose & Ross, 2017). Access lists can restrict the data transfer across the network based on incoming and outgoing data packets across the network. When data is transferred on the network, it first reaches the switch looks into its Address Resolution Protocol (ARP) table to translate Media Access Control address into IP address. The switch transfers the packet to the firewall. The firewall examines the packets and decides whether to forward the packet or discard the packet. If the packet complies with the policies defined in the settings of the firewall, it is forwarded else it is dropped. Then the packet is transferred to the router. Then the router looks into its routing table to transfer packet onto the best path to the destination.
References:
Use this document as a guide for formatting and organizing your CMIT 350 final Network Design Proposal submission.
Professionalism will be key to your success and advancement in your academic and professional career. Use the title page to identify relevant information such as your name, the course, professor, and submission/completion date.
Organization will allow your document to be divided into key areas of consideration and allows an overall structure to be placed over the submission.
(Provide a section for each site, as suggested in your table of contents.)
Here, you will simply summarize the site requirements and/or challenges you are attempting to overcome. You will not need to implement solutions or discuss your approach at this point. This information is provided to you and can simply be organized and restated as you understand it. Think of this area as what needs to be corrected. Suggested length would be one or two paragraphs.
As described in the scenario, the Dallas site was developed without any VLAN structure, and administrators have found the need to isolate broadcast traffic from a layer-2 perspective.
With the challenges stated, you will be able to clearly define your approach to solving those challenges and can state the technologies you will be implementing. Use this area to justify your approach and selection of technologies. The specific length and details of this area will vary based on the specifics and depth of the challenge you are facing. Your justification would be your selection of a specific technology or approach over another and why you chose the approach you are taking. Show off your knowledge in the foundational skills here.
In order to relieve the administrative tasks surrounding the implementation of manual IP addressing per device, we will configure and implement a DHCP (dynamic host configuration protocol) server, per site requirements. The DHCP allows for devices to identify, request and implement IP configurations as well as other settings….
Since this area may call for facts and details around technologies and approaches, you will most likely find yourself using in-text citations, which would appear as follows:
Open Shortest Path First is an open standard routing protocol that’s been implemented by a wide variety of network vendors, including Cisco (Jones, 20xx).
Understanding the technologies will satisfy a portion of the documents’ requirements. You will also need to display how the solutions you are suggesting would be implemented.
Embed a copy of the PTK file for the Packet Tracer File you created.
When structuring solutions per certain sites, you may find it helpful or even necessary to structure information with tables and/or diagrams. These items can be used to support and display your understood solutions located in the “Site Solution(s) and Technologies” area. Display your organizational and logical skills in this area.
Provide an updated and polished network design diagram (Assignment 1 updated).
Repeat the format to include document components for each site. In this sample, sections numbered II and III in your table of contents would be provided next, followed by the bibliography.
Be responsible with your research and included works. Provide proper credit in the APA format to original authors and their works that you leverage in your submission.
Economic Debate- Progressive Income Tax For this Economic Debate, we are going to discuss the…
TOPIC: Going Global Discussion Thread 1 (initial post due Wednesday for full credit) Please note:…
Assignment Topic This week will culminate in the creation of a narrated PowerPoint to create…
The Assignment must be submitted on Blackboard (WORD format only) via allocated folder. Assignments submitted…
you need to post your 2-page information flier to share with your Final Project Group.…
discussion: Discuss the methods used at your company to measure and ensure quality products and…