ASM2
ASM2
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.
Grading grid
P5 P6 P7 P8 M3 M4 D2 D3
1
Summative Feedback: Resubmission Feedback:
2
Table of Contents
I. Introduction: ........................................................................................................................................ 5
II. Provide a logical/physical design of the networked system with clear explanation and addressing
table:(P5) ................................................................................................................................................. 5
III. Evaluate the design to meet the requirements: (P6) ........................................................................ 9
IV. Implement a networked system based on a prepared design:(P7) ................................................ 11
V. Document and analyse test results against expected results:(P8) ................................................... 16
VI. Recommend potential enhancements for the networked systems:(M4) ........................................ 22
VII. Design a maintenance schedule to support the networked system:(D2) ...................................... 23
VIII. Use critical reflection to evaluate own work and justify valid conclusions:(D3) ....................... 24
IX. Conclusion: ...................................................................................................................................... 24
X. References: ........................................................................................................................................ 26
3
Table of Figure
Figure 1: Physical topology. .................................................................................................................................. 5
Figure 2: Logical topology. .................................................................................................................................... 6
Figure 3: User requirements and System requirement. ....................................................................................... 6
Figure 4: The logical design for my network. ....................................................................................................... 7
Figure 5: The physical design for my network. .................................................................................................... 8
Figure 6: Test Ping PC1 to R0............................................................................................................................. 10
Figure 7: Test Ping PC8 to PC12. ....................................................................................................................... 10
Figure 8: My designed network. ......................................................................................................................... 11
Figure 9: Configure Switch6. .............................................................................................................................. 12
Figure 10: Configure Router0. ............................................................................................................................ 13
Figure 11: Configure Switch3. ............................................................................................................................ 14
Figure 12: Configure Switch4. ............................................................................................................................ 14
Figure 13: Configure Switch2. ............................................................................................................................ 15
Figure 14: Configure Switch1. ............................................................................................................................ 15
Figure 15: Configure IP on Router0. .................................................................................................................. 16
Figure 16: Configure IP on Switch3.................................................................................................................... 16
Figure 17: Test Ping PC10 to PC3. ..................................................................................................................... 19
Figure 18: Test Ping Staff PC3 to Managers PC9. ............................................................................................. 20
Figure 19: Test Ping Student PC1 to Teacher PC11. ......................................................................................... 20
Figure 20: Test Ping Student PC7 to Staff PC3. ................................................................................................. 21
Figure 21: PC gets dynamic IP. ........................................................................................................................... 22
4
I. Introduction:
This report covers the process from solution design to implementation of the designed network. An
evaluation of my designed network and future improvements.
II. Provide a logical/physical design of the networked system with clear explanation
and addressing table:(P5)
Logical layouts determine the flow of data or communication between two network, while physical
layout is a communication between two computers connected by cables. Depending on the availability and
selection of devices, the physical topology has a significant impact on the cost, scalability and bandwidth
capacity of the network. The logical topology has a significant impact on the delivery and speed of data
packets. It also controls the flow of data and ensures that data packets are delivered on time. The topology
only exists in the bus and ring topology.
5
Figure 2: Logical topology.
There are two types of security requirements engineering concepts used to determine security constraints:
6
The user requirements include diagrams, constraints, and operational statements of the user’s language of
the services that the organization may provide. The systems requirements include descriptions of systems
function, operational constraints and structed documents that define how and what system implementation
is required as part of the development.
The user requirements definitions include systems of customers, suppliers, distributors and staff systems
usage activities. For instance, the AMI will generate a monthly statement detailing the amount of
electricity used. Payments will be made via direct debit. The system will generate a monthly management
report detailing the use of electric power in an area for those who have paid their utility bill regularly and
those who don’t. Systems requirements specifications will include a sum mary of all activities and
transactions carried out on the systems and the various interactions with external entities, bank, suppliers,
distributors, and customers.
A logical design of the network based on the specific requirements of the user:
In my bodily design, I installation all of the computer systems and printer at the floor ground, 25 lab
computer systems on the primary ground and the opposite 25 ones on the second one ground. I join 25 lab
computer systems in eachfloor to a separate transfer then join the transfer to a router placed in 2nd ground.
On theground ground, there might be four rooms such as: teachers’ room, staffs’ room, managers’ room,
and community administrators’ room. In the teachers’ room, there are 15 PCs and 1 printer. In the staffs’
room, there consists of 12 PCs and 1 printer. In the managers’ room, there consists of five PCs and 1
printer. In the community administrators’ room, there consists of three PCs. All computer systems and
7
printer at the floor ground might be cabled to a transfer this is linked to a router. Then this router might be
connect with the router on the primary and 2nd ground.
8
DNS server 192.168.6.4 255.255.255.0
9
Figure 6: Test Ping PC1 to R0.
In my community design, I use big name topology to attach all gadgets speak with every different
circuitously thru the significant switch. By the usage of this topology, there are numerous advantages and
a few barriers in my design.
Advantages:
10
- It could be very dependable due to the fact if one cable or tool fails then all of the others will
nonetheless work.
Disadvantages:
- The relaxation of community couldn't paintings if the imperative transfer turns down. This is
inconvenient to show down the complete community if the faculty want to keep and improve
handiest the imperative transfer.
- Switch calls for greater assets and normal protection due to the fact it’s the imperative gadget of
star.
- More high-priced than linear bus topology because of the price of the connecting devices
(community switches) and requiring greater cable
- Extra hardware is required (hubs or switches) which provides to value as well.
By thinking about the limitations of my design, to make this community paintings effectively, I want to
have a few spare switches and routers. In case a router or transfer turns down, the relaxation community
could now no longer paintings, therefore, we want an opportunity router and transfer to apply in place of
looking to repair that. Also, to save you the turning down of a transfer or router, we want to keep
regularly.
11
Then I Configure the Wireless Router0, Switch6, Switch1, Switch2, Switch3 and Switch4 according to the
following guidelines:
12
Figure 10: Configure Router0.
13
Figure 11: Configure Switch3.
14
Figure 13: Configure Switch2.
15
Figure 15: Configure IP on Router0.
On Router0:
dairouter#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
16
dairouter (config) # line console 0
dairouter (config-line) #password 12345678
dairouter (config-line) #login
dairouter (config-line) #exit
dairouter (config) #
dairouter (config) #
dairouter (config) #
dairouter (config) #
dairouter (config) #
dairouter (config) #line vty 0 4
dairouter (config-line) # password 12345678
dairouter (config-line) #login
dairouter (config-line) #exit
dairouter (config) #
dairouter (config) #
dairouter (config) #
dairouter (config) #
dairouter (config) #
dairouter (config) #interface fastEthernet 0/0
dairouter (config-if) #no shutdown
dairouter (config-if) #ip address 192.168.6.1 255.255.255.0
dairouter (config-if) #exit
dairouter (config) #
dairouter (config) #
dairouter (config) #
dairouter(config)#ip dhcppool
dairouter(config)#ip dhcp pool subnet192
dairouter(dhcp-config)#net
dairouter(dhcp-config)#network 192.168.6.0 255.255.255.0
dairouter(dhcp-config)#de
dairouter(dhcp-config)#default-router 192.168.6.1
dairouter(dhcp-config)#dns
dairouter(dhcp-config)#dns-server 192.168.6.4
dairouter(config)#ip dhcp ex
dairouter(config)#ip dhcp excluded-address 192.168.6.1 192.168.6.10
dairouter(config)#
On Switch6:
Switch (config) #hostname dai123
17
Dai123 (config) #
Dai123 (config) #
Dai123 (config) #
Dai123 (config) #line console 0
Dai123 (config-line) #password 1234567
Dai123 (config-line) #login
Dai123 (config-line) #exit
Dai123 (config) #
Dai123 (config) #
Dai123 (config) #
Dai123 (config) #line vty 0 4
Dai123 (config-line) #password 1234567
Dai123 (config-line) #login
Dai123 (config-line) #exit
Dai123 (config) #
Dai123 (config) #
Dai123 (config) #
Dai123 (config) #interface vlan 1
Dai123 (config-if) #no shutdown
Dai123 (config-if) #ip address 192.168.6.0 255.255.255.0
Dai123 (config-if) #exit
Dai123 (config) #
Dai123 (config) #
Dai123 (config) #
Dai123 (config) #
Dai123 (config) #
Testing result:
18
7 Ping from Student PC 1 to Enabled Pass
Teacher PC 11
8 Ping from Student PC 3 to PC Enabled Pass
9
9 Ping from Teacher PC 11 to R0 Enabled Pass
10 Ping from Teacher PC 10 to R0 Enabled Pass
11 Ping from Teacher PC 10 to Enabled Pass
Staff PC3
19
Figure 18: Test Ping Staff PC3 to Managers PC9.
20
Figure 20: Test Ping Student PC7 to Staff PC3.
21
Figure 21: PC gets dynamic IP.
Go For the Virtual Local Area Networks (VLANs): A VLAN creates its broadcasting area with
the aid of using splitting a bodily community this is in life into severa logical networks. Thereby
making sure that thru a collection of gadgets is placed on distinctive LAN segments, they talk as
though they're at the identical wire. Thus growing an possibility for community assets and
additives to be partitioned and remoted in a community on the information hyperlink layer. As a
result, an workplace profits the advantages of walking a couple of networks in a single community,
with out rewiring the workplace unnecessarily.
22
Provide a Different Network for Guests: Having too many customers on a community may be
likened to having too many cars on a road, the probabilities of getting a visitors jam might be
higher, and with a visitors jam, all of the cars on the street will generally tend to transport slowly –
each the joyriders and people which have emergency duties to accomplish. In comparison, terrible
community overall performance may be a end result of getting too many customers on a
community. Having one or visitors at an workplace foyer streaming videos, may not be a reason
for sluggish overall performance. But whilst it’s an agency that has as much as 100 visitors at any
given hour, well, so that it will maximum in all likelihood be a reason of community slowdowns.
Data Compression: Bandwidth obstacles are not anything new in community management; it
appears as though they'll usually be there. Before now, networks used to have spare bandwidths
which usually featured as spare bandwidths – simply what they're supposed to be – however with
developing wishes including records restoration in case of emergency, growing centralized
community infrastructure and business enterprise boom which ends up in extra team of workers
users, nearly each little bit of bandwidth is used up. Consequentially, bandwidth hassle is sort of
unavoidable.
Do the Necessary Updates and Upgrades: With technology, not anything is ever the identical for
lengthy; there'll usually be changes, and you'll want to preserve up with them in case you need to
live applicable and extra productive. In essence, for a community to characteristic optimally, all
issue software program and firmware worried will want to be up to date as new updates are rolled
out. If you've got got used a software program for too lengthy with out making any sizable extrade
to it, whilst your workplace duties growth exponentially each day in a bid to fulfill new customer
needs, you'll maximum probable be aware that duties aren't finished as speedy as they used to be.
Monitoring Tools Are a Sure Way to Improve Network Performance: Network control
structures exist due to the fact there are community tracking equipment to make matters less
difficult than ever before. Monitoring equipment offer specified perception and evaluation at the
reasons of community mistakes and in which they're located, thereby putting off the downtime
skilled at the same time as attempting to find the supply of mistakes. Though by and large
dependent to proactively offer statistics at the fitness of a community to be used via way of means
of community engineers, tracking equipment can cross as a long way as troubleshooting sure
mistakes if computerized to do so.
Upgrading Hardware and Software: Installing, changing, and upgrading hardware and software
program is an essential a part of community renovation as it guarantees that your IT community
isn't made inclined with the aid of using previous technology. Upgrading hardware and software
23
program can consist of the entirety from changing older or failed hardware to upgrading patch
levels.
Network Monitoring: Proactive tracking is critical to growing an powerful community upkeep
method for any enterprise as it permits capability troubles to be detected and solved earlier than
they are able to negatively effect a enterprise’ operations. When tracking a community, it's miles
crucial to report any capability troubles to make certain that the whole lot is being treated properly.
Network Security: One of the maximum essential components of community operation and
renovation is community protection. Having a committed protection crew that constantly video
display units your IT community and facilitates maintained a dependent renovation technique will
assist you find out capability vulnerabilities and protection threats, each internally and externally,
earlier than they are able to have an effect on your business.
Scheduling Backups: While lots of companies have a tendency to provide low precedence to
appearing recurring protection duties like facts backups, frequently backing up your business’
crucial facts may be vital in convalescing records misplaced because of a severe or important
community failure. Making certain to schedule, monitor, and affirm all backups of center
community additives and gadgets will make it simpler and quicker to get better a community or
man or woman community additives after a hardware or software program failure.
IT infrastructure compliance: Maintaining internal compliance with company practices as well
as external government regulations and industry policies.
VIII. Use critical reflection to evaluate own work and justify valid conclusions:(D3)
Overall, with the aid of using thinking about the benefits and the risks from above, I
determined that my community has a number of blessings in preference to constraints. The
boundaries of my community are pretty much the value of putting in place and the protection
of the important transfer and router. And I assume the person can cope with those issues.
My designed community became efficiently exceeded my check plan. All the gadgets can
ping with every other. And the IP deal with of the gadgets are routinely supplied with the aid
of using the server. Therefore, my community has met the requirement that the person need.
In conclusion, even though my designed community has efficiently met all of the person
requirement, however withinside the future, I could improve and offer greater offerings to my
community in order that the person can have a brilliant enjoy whilst the usage of my
designed community.
IX. Conclusion:
In conclusion, my network project has met the user requirements and successfully passed the test.
From this assignment, I learned how to design and implement a networking project from a local
24
educational institute based on their requirement. In the future, I will improve my network so that, it can
connect to the internet or connect to another outside network.
25
X. References:
1. Doug-lowe (2018) Networking All-in-One For Dummies, 7th Edition.
2. Edward Tetz (2011) Cisco Networking All-in-One For Dummies, 10th Edition.
26