Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Networking Assignment 1st part, Summaries of Computer Systems Networking and Telecommunications

Student will get the basic idea about networking

Typology: Summaries

2021/2022

Uploaded on 06/06/2023

noy-alam
noy-alam šŸ‡¬šŸ‡§

5 documents

1 / 38

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Assignment Title
Local Area Network (LAN) Design and Implementation
.
Student Name/ID Number: Md Tauhidul Alam/273284
Unit Number and Title: Unit 2: Networking
Academic Year: 2021-22
Unit Assessor: Steve Benge
Assignment Title: Assignment 2 LAN Design & Implementation
Internal Verifier Name: Roger Francis
Date: 17/02/2022
1 | P a g e
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e
pf1f
pf20
pf21
pf22
pf23
pf24
pf25
pf26

Partial preview of the text

Download Networking Assignment 1st part and more Summaries Computer Systems Networking and Telecommunications in PDF only on Docsity!

Assignment Title

Local Area Network (LAN) Design and Implementation

Student Name/ID Number: Md Tauhidul Alam/ Unit Number and Title: Unit 2: Networking Academic Year: 2021- Unit Assessor: Steve Benge Assignment Title: Assignment 2 LAN Design & Implementation Internal Verifier Name: Roger Francis Date: 17/02/

Table of Contents

  • List of Figures.............................................................................................................................................
    1. Introduction.............................................................................................................................................
    1. Network Design.......................................................................................................................................
    • 2.1 Overview of Network Design............................................................................................................
    • 2.2 Methodological step of network design.............................................................................................
    • 2.3 Networking Tools, and Technique and justification..........................................................................
      • 2.3.1 Devices: Computer, Printers, and Scanner..................................................................................
      • 2.3.2 Network: LAN (Local Area Network)........................................................................................
      • 2.3.3 Topology: Bus............................................................................................................................
      • 2.3.4 Speed: Fast..................................................................................................................................
      • 2.3.5 Security: firewall, password protection.......................................................................................
    • 2.3.6 Hypertext Transfer Protocol (HTTP)............................................................................................
    • 2.4 Lan network design plan in Packet tracer........................................................................................
    • 2.4.1 Add a new router to the network and connect it to the existing switch.........................................
    • 2.4.2 Configure the new router with the IP address 192.168.1.1 and the subnet mask 255.255.255.0..
      • 2.4.3 Configure the switch with the IP address 192.168.1.254 and the subnet mask 255.255.255.0..
      • 2.4.4 Connect the computers to the switch.........................................................................................
      • 192.168.1.254.................................................................................................................................... 2.4.5 Configure the computers with the IP address 192.168.1.10/24 and the default gateway
    1. Evaluation of Design.............................................................................................................................
    1. Implementation......................................................................................................................................
    • 4.1 Switches and Routers.......................................................................................................................
    • 4.2 DHCP Server...................................................................................................................................
    • 4.3 Computers.......................................................................................................................................
    • 4.4. Test the Network............................................................................................................................
    1. A proposed and justified maintenance schedule for long-term..............................................................
    • 5.1 Optimization....................................................................................................................................
    • 5.2 Fully completed test plan.................................................................................................................
      • Action plan........................................................................................................................................
      • Implementation of Tools and Techniques..........................................................................................
    1. Conclusion.............................................................................................................................................
    1. References.............................................................................................................................................
  • Appendices................................................................................................................................................
      1. Network device and packet tracker....................................................................................................
    1. Adding Host......................................................................................................................................
    1. Building Topology.............................................................................................................................
    1. Adding switch....................................................................................................................................
    1. Configuration of IP address and Sub net Masks on the Host.............................................................
    1. Click on fast ethernet.........................................................................................................................
    1. Network simulation...........................................................................................................................
    1. Router to bring up the windows.........................................................................................................
    1. Click on Ethernet...............................................................................................................................
    1. Basic Device configuration................................................................................................................
  • 10.Log in...............................................................................................................................................
    1. Basic network operation and troubleshooting..................................................................................
    1. Two HTTP request method..............................................................................................................
  • Figure 1 LAN network diagram................................................................................................................... List of Figures
  • Figure 2 Methodological steps of LAN Network design.............................................................................
  • Figure 3 Bus Topology Network.................................................................................................................
  • Figure 4 Speed Test
  • Figure 5 Firewall protection........................................................................................................................
  • Figure 6 Connect the switches and routers to the power supply................................................................
  • Figure 7 Connect the switches and routers to each other...........................................................................
  • Figure 8 Connect the computers to the switches........................................................................................
  • Figure 9 Configure the switches and routers..............................................................................................
  • Figure 10 Lan speed test............................................................................................................................
  • Figure 11 Connect the DHCP server to the power supply.........................................................................
  • Figure 12 DNS Server to the network........................................................................................................
  • Figure 13 Configuration of DHCP server..................................................................................................
  • Figure 14 DHCP Server test......................................................................................................................
  • Figure 15 Connecting computers to the network.......................................................................................
  • Figure 16 Running server on Windows.....................................................................................................
  • Figure 17 IP address of the computer in the address bar............................................................................
  • Figure 18 Log in credentials......................................................................................................................
  • Figure 19 Lan speed result.........................................................................................................................

1. Introduction

The company is in the process of acquiring a new building in Swindon to expand UK operations. The traditional Swindon area is a heavy industry town and there is a serious shortage of qualified staff to design and develop the infrastructure for the new building. The operations manager in the USA has asked to demonstrate understanding the principles and technical skills required to do this. Given that this paper will summarize key concepts of design and implementation of LAN network along with showing the application in light of Packet Tracer Designing and configuring a computer network is a complex process that requires a good understanding of the principals involved. A well-designed computer network is important because it will be more efficient and reliable (Goni, 2021; Qin et al. , 2021; Rasmila and Laksana, 2019). A well-designed network will be better able to meet the needs of the users, and will be less likely to experience problems ( Building A Cisco Wireless LAN , 2002; Chowdhury, 2000). The main components of a computer network are the cables and connectors that are used to connect the different devices. There are a variety of different types of cables and connectors, and it is important to select the right ones for the job. Fiber optics is a type of cable that is used in computer networking. It has a number of advantages over traditional copper cables, including higher bandwidth and immunity to interference. The different types of hardware that are used in computer networking include switches, routers and firewalls. These devices are used to connect the different components of the network, and to provide security and protection. The different components of a computer network are interconnected by a variety of different cables and connectors. The devices are usually configured using a software program, and the configuration can be changed as needed. Testing and debugging a computer network is important because it allows the network to be checked for problems and corrected. Without testing and debugging, the network may not work properly and could cause problems for the users.

2.2 Methodological step of network design

The network design must be able to support up to 100 users(Qiang, 2022). Methodological stage of design of LAN (Local Area Network) are illustrated below:

  1. The first step in designing a LAN for the company is to identify the devices that will be connected to the network. In this case, the devices include computers, printers, and scanners(Tarkaa et al. , 2017).
  2. The next step is to identify the type of network that will be used. A LAN is a good choice for a business because it is confined to a certain area and allows devices to share resources(Estepa et al. , 2011). Figure 2 Methodological steps of LAN Network design
  3. The next step is to identify the network's topology. A bus topology is a good choice for a business because it is easy to set up and is less expensive than other types of networks(Lee and Wu, 1994).
  4. The next step is to identify the network's speed. A fast network is important for a business because it allows employees to access the network quickly and share resources efficiently(Seneviratne and de Silva, 2021).
  5. The last step is to identify the network's security features. A LAN should be secured with a firewall and password protection to prevent unauthorized access(Bahri and Chamberland, 2005).

1. Devices

connected to

the network.

2. Type of

network used.

3. Topology

Selection

4. Network

Speed

5. Network

Security

Feature

2.3 Networking Tools, and Technique and justification

2.3.1 Devices: Computer, Printers, and Scanner

Devices that include computers, printers, and scanners are important in order to connect and share resources in a network. In general, these devices are important in order to connect to the internet and share files(Seneviratne and de Silva, 2021). In addition, these devices are often used in order to communicate with others in a business setting(Bahri and Chamberland, 2005).

2.3.2 Network: LAN (Local Area Network)

A LAN, or local area network, is a computer network that connects devices within a limited area(Bahri and Chamberland, 2005). LANs are commonly used in homes and businesses to share resources like printers and scanners. LANs are typically faster and more secure than wide area networks, or WANs (Haas and McLaughlin, 2008). WANs connect devices over a large area, like a city or country. LANs are typically connected through a bus topology, which means that all devices are connected to a single cable. This makes setup and maintenance simpler than other network topologies. LANs are often secured with firewalls and passwords, which help to protect against unauthorized access(Chen et al. , 2012). Overall, LANs are a convenient and secure way to connect devices within a limited area.

2.3.3 Topology: Bus

Figure 3 Packet Tracer Topology Network

2.3.5 Security: firewall, password protection

A firewall is a security system that is used to protect a computer or network from unauthorized access. A firewall can be used to protect a computer or network from a variety of threats, including hackers, viruses, and malware(Rasmila and Laksana, 2019). A firewall typically consists of two components: a software firewall and a hardware firewall. A software firewall is a program that is installed on a computer and that provides protection against unauthorized access. Figure 5 Firewall protection A hardware firewall is a device that is installed on a network and that provides protection against unauthorized access. Firewalls can be used to protect a computer or network in a variety of ways(Goni, 2021). One way that firewalls can be used to protect a computer or network is by blocking unauthorized access. Firewalls can also be used to protect a computer or network from a variety of threats, including hackers, viruses, and malware(Qin et al. , 2021).

2.3.6 Hypertext Transfer Protocol (HTTP)

HTTP is a protocol used to transfer data between a client and a server. It is the foundation of data communication for the World Wide Web. HTTP can be used in Lan network design and test to transfer data between devices on the network. This can be used to test the performance of the network and to troubleshoot any issues that may occur.

2.4.2 Configure the new router with the IP address 192.168.1.1 and the subnet mask

To configure the new router, open the command prompt and run the following commands: ipconfig /all and route print. This would give us the IP address, the subnet mask, and the default gateway for the router. ( Please see appendix )

2.4.3 Configure the switch with the IP address 192.168.1.254 and the subnet mask

To configure the switch, open the command prompt and run the following commands: ipconfig /all and route print ( Please see appendix )

2.4.4 Connect the computers to the switch.

To connect the computers to the switch, first connect the computers to the switch. Then configure the computers with the IP address 192.168.1.10/24 and the default gateway 192.168.1.254. ( Please see appendix )

2.4.5 Configure the computers with the IP address 192.168.1.10/24 and the default

gateway 192.168.1.254.

( Please see appendix )

4. Implementation

The network administrator would first configure the switches and routers. Then, the DHCP server would be configured. Finally, the computers would be configured(Osman and Shameem, 2021).

4.1 Switches and Routers

The switches and routers would be configured using the following steps:

1. Connect the switches and routers to the power supply. Figure 7 Connect the switches and routers to the power supply 2. Connect the switches and routers to each other.

Figure 8 Connect the switches and routers to each other

3. Connect the computers to the switches. Figure 9 Connect the computers to the switches

5. Test the network. Figure 11 Lan speed test The LAN network can be tested using a variety of methods. One common method is to use a network analyzer. A network analyzer is a tool that can be used to test the performance of a network(Mateus et al. , 2001). It can be used to test things such as the speed of the network and the amount of traffic that the network can handle. The network analyzer would use statistical measures to test the speed of the network and the amount of traffic that the network can handle(Gendron et al. , 2016). This would include things such as the average amount of time it takes for a packet to travel from one end of the network to the other and the percentage of packets that are lost on the network.

4.2 DHCP Server

The DHCP server is a server that is used to assign IP addresses to devices on a network. When a device connects to the network, it will request an IP address from the DHCP server(Marucheck and Sulek, 1987). The DHCP server would then assign an IP address to the device from its pool of IP addresses(Lima et al. , 2017). It would be configured the DHCP server using the following steps:

1. Connect the DHCP server to the power supply. Figure 12 Connect the DHCP server to the power supply