Assignment: Advantages Disadvantages
Assignment: Advantages Disadvantages
Assignment: Advantages Disadvantages
Local Area Networks and Wide Area Networks have a fantastic deal in common, but the
variations are significant enough to distinguish them in speech and practice. Each has advantages
and disadvantages, and these advantages and disadvantages can have a direct impact on an
organization's productivity.
Advantages Disadvantages
High Speed Only Available in a Small
Area
Low Cost
Setup time is minimal.
Local area networks (LANs) can only run in a small area, such as a house or a floor in an office
building. Typically, a LAN would have only a few clients, but it may have as many as a hundred.
One of the most significant benefits of LANs is the high speeds that they can achieve. It's not
unusual to see technology ready for 1Gbps on a LAN (1 gigabit per second).
Advantages Disadvantages
Allow for a much larger High Cost
and more complex
network to be created.
Can travel a near-infinite Low Speed
distance geographically
Only in large environments can a WAN connection be used. House to house, city to city, and
country to country WAN connections are available. In reality, simply reading this indicates that
you have access to the Internet, a widely used WAN. But what distinguishes a WAN, such as the
internet, from a LAN? WANs are almost always slower than LANs due to their normally large
scale.
Task 1:
SR No Client’s Requirements
1 There are four departments i.e. Management, Sale, Operation,
Exploration)
2 172.16.0.0 is a private network's IP address and 172.20.0.0 is a head
office IP address for its private addresses.
3 Security requirements include: The management group must have
the ability to the other three departments but however the other
three, on the other hand, do not have ties to Management.
4 In the initial design, Cisco 2800 series routers and 2960 switches
were used.
5 Proposal for a network architecture that includes a completely
costed bill of required materials as well as a network diagram,
which provide the physical layout of the network.
6 Each department has 48 PCs and one server.
7 Open Shortest Path First (OSPF) should be enabled on the
connection.
8 Survey of the wireless sites.
Task 2
Now, in order to meet the client's needs, some ISP network configuration with the proper sort of
media is required. With the help of Telstra ISP, two distinct branches can be configured. As a
result, numerous switch devices are utilized to perform LAN network setup, depending on the
needs of each department. The 2800 series devices are used to link a LAN network, and VPN or
IPSEC configuration is done between the two branch office networks. On the LAN side, some
VLANS configuration is needed for better results.
As a result, some IP allocation is done for the WAN network connection and distant users using
the proper NAT or PAT settings. The access control list allocation ensures the security of a
network interface. Hence, all departments have enough IP addresses for 12 PCs and a server, as
per the criteria. With the 512 PCs connection, some additional IP allocation has been done for
future use. The DHCP protocols, which encompass four different subnets, are used to assign IP
addresses to all PCs. Also as result, each subnet's subnet mask is 255.255.254.0, which meets the
user connectivity requirements. The ROAS is used to communicate between different VLANs, as
well as some security features like as ACL and PPP.
The following are the information and overview of the network that will be provided:
Two routers and five switches are connected by cables with a special Subnet Mask which
will be located in the Pacific IT Solutions Pty. Ltd.
We can set a username and password on the routers for security reasons.
Accessing or not being able to pass those sections of the network using ACL
configuration.
To link to the WAN, you'll need to configure NAT.
Cisco Catalyst 2960 switches are the ones that should be purchased.
Task 3
The network addressing scheme specifies the network address to be used, as well as the
broadcast address, some allocated IP addresses, any default gateways, reserved IP addresses, and
the valid range of IP addresses that can be issued to workstations.
The device naming method is crucial in a networked environment. The naming strategy should
be implemented in such a way that a new individual engaging with the network can quickly
identify the networking device. Our naming strategy will be based on the device naming
scheme's location name.
Assuming that our service provider has assigned us an IP address of 172.16.17.0/23, our network
will be subnetted to produce the IP addressing table below.
Following the allocation of particular IP subnet blocks for each department's network, each
device now requires proper naming. The assignment of suitable name can make troubleshooting
much easier. To allocate an appropriate name, the following format is used: branch name_ device
name_ device number.
Task 5
The table below shows a breakdown of the tasks that must be completed.
Following the completion of particular tasks, it is necessary to configure various network devices
with certain settings. As a first step, some IP addresses must be configured on router devices so
that they can communicate with other networks. The 172.20.0.0 IP address block is used for the
head office network, whereas the 172.16.0.0 IP address block is used for the branch office
network. Following the creation of a virtual network for each department, switch devices must be
configured with unique VLAN configurations. The switch's configuration is done on switch
devices, which are then assigned to appropriate ports.
Communication between two separate VLANs is feasible with the inter VLAN routing setup.
Following the ROAS and VLAN configuration at network devices, a correct IP address must be
assigned, which is accomplished via the DHCP pool settings at the gateway router. However,
communication between multiple networks can be accomplished via the routing parameter, for
which OSPF routing is configured.
Design
Requirements Implement
Network Test Network
of the network Network
Structure
Deploy and
Prepration of
configure
the business
equipments for
proposal
the network
Meeting for
Making the Elaboration of socialization
quotes the contract of the business
proposal
Approval of
the proposal
Task 6
Catalyst 2960:
This equipment can only be installed, replaced, or serviced by trained and skilled staff.
To avoid the turn overheating, do not use it in an environment that is hotter than 113
degrees Fahrenheit (45 degrees Celsius). Enable at least 3 inches (7.6 cm) of clearance
around the ventilation openings to avoid airflow restriction.
The equipment must be installed in accordance with local and national electrical codes.
When installing or repairing this device in a rack, you must take special care to ensure
that the machine remains secure to avoid bodily injury. To ensure your safety, follow the
following guidelines:
If this device is the only one in the rack, it should be placed at the bottom.
Load this device from the bottom to the top when placing it in a partially filled rack,
starting with the heaviest section at the bottom.
Until installing or servicing the unit in the rack, make sure the stabilizers are mounted.
This apparatus is designed to be grounded. During normal usage, make sure the host is
connected to the earth ground.
If the switch does not have a backup power system, cover the RPS connector on the back
(RPS).
For connections outside the building where the equipment is located, the following ports
must be connected to an approved network termination device with integral circuit safety:
Ethernet 10/100/1000.
Warning! On PoE circuits, voltages that pose a shock hazard can occur if
interconnections are made using insulated exposed metal contacts, conductors, or
terminals. Avoid using this type of methods of interconnection. Unless the exposed metal
parts are placed within a restricted access location and users and service personnel who
are allowed inside the restricted access location are made aware of the risk. To gain
access to a restricted access area, only a special form, lock and key, or other means of
authentication can be used.
Task 7
All of the things were protected 100% after evaluating the power and data quote given by IT
Consultant, Pacific IT Solutions Pty. Ltd, but there are some suggestions for modifications which
are listed below:
The item CAT5e and Patch Panels are insufficient. So that kindly thinks about a future
expansion of the Network for the company.
Thank you for choosing our service related with the networking needs. We’ve been serving
from last 20 years. Please do not hesitate to call if you have any questions about this quote.
Please feel free to proceed with the approval process for this quote after reading this email.
Yours faithfully
Parminder Singh
Task 8
General Requirement
The network will be made up of 1Router, 5 Switches and 1 Server of which will be
located in the Pacific IT Solutions Pty. Ltd.
Cisco Catalyst 2960 switches are the ones that should be purchased.
There will be 6 switches which are used across the network, 1 in Pacific IT Solutions Pty.
Ltd and 5 in Western Mining Head Office.
For the WAN link between Western Mining Head Office and Pacific IT Solutions Pty.
Ltd, Open Shortest Path First (OSPF) will be configured as the primary routing process.
The IP directions will be created with the help of Variable Length Subnet Mask (VLSM).
Access Control Lists can handle the rules for navigation, accessing, and general network
management such as links, ping blocking, and so on.
Ethernet Channel mixed with Port Aggregation Protocol (PAgP) and Link Aggregation
Control Protocol (LACP) will be configured among the three company departments to
meet bandwidth and balancing requirements.
DHCP must be handled by Pacific IT Solutions Pty. Ltd as a service provided by the
server in this case.
Many of the network administrator's usernames and passwords must be hidden.
The network's PCs and servers must be able to access the Internet using an IP address
that has been fully translated by a Network address translation (NAT).
Specific Requirements:
The first level is for the sales staff. They'll need at least 510 addresses for each subnet.
The Operation Team is on Level Two and they'll need at least 22 IP addresses.
The Management team is on Level Three and they'll need at least 10 IP addresses.
The Exploration team is on Level Four and they'll need at least 189 host IP addresses.
Configure the WAN link on both ends. OSPF is being used throughout the link. They'll
use 172.16.10.0/16 and a WAN LINK with copper cross-over cable.
The computer in the Management network is prohibited from accessing (ping) for other
networks, but this server should be able to ping other computers.
A remote login to the switches and routers is needed by the management PC.
The necessary cables and connectors will be provided.
The following documents related to this requirement are attached to this email:
The terms mentioned above are negotiable and can be altered if necessary.
Parminder Singh
Task 9
It is my pleasure to inform you that, following acceptance of our proposal for your network's
requirements, site access and information regarding or coordination with power and data
installation , we would like to know when the best time is to sign the service contract and begin
the installation and configuration of the work.
Parminder Singh
Task 10
Task 11
Following the completion of the above-mentioned connectivity tests, the OSPF routing
configuration must be checked, as illustrated in the following screenshots:
I'd like to share the results of the network installation with you after it's over. The construction of
the project that was completed according to the schedule and specifications that were provided
by you.
All of the items needed for the Networking department were checked and approved step by step.
Approval was given for the capacity, efficiency, functionality, and accuracy of any item installed
and configured for the network.
Parminder singh
Western Mining
Subject: Providing information on the NBN's rollout, implementation, benefits, and costs.
This is to notify you that the NBN has been rolled out in Brisbane on behalf of Pacific IT
Solution. When transferring from an existing link, the NBN connection will be free. As part of
the casual package payments, it will cost about $120.
The NBN connection has a few advantages over the current E1 connection. It will be much less
expensive and quicker than the current link. The linking speed is adequate for high-definition
video calls and other official tasks. The rate of link dropout is also very low.
Current security systems will become redundant, which poses a security risk. Implementing
NBN-compatible protection systems will address the issues. I hope the suggestions are taken into
consideration. Thank you so much.
Parminder singh
Task 14
Refer to the Packet Tracer File
Task 15
References
Airi, P. and Anderson, P.K., 2017. Cisco Packet Tracer as a teaching and learning tool for
computer networks in DWU. Contemporary PNG Studies, 26, p.88.
Caria, M., Das, T., Jukan, A. and Hoffmann, M., 2015, May. Divide and conquer:
Partitioning OSPF networks with SDN. In 2015 IFIP/IEEE International Symposium on
Integrated Network Management (IM) (pp. 467-474). IEEE.
Cooper, C.B. and Richter, C.L., PROOFPOINT Inc, 2019. Method, system, and storage
medium for adaptive monitoring and filtering traffic to and from social networking sites.
U.S. Patent 10,454,948.
Davies, S.J., Burhan, A.M., Kim, D., Gerretsen, P., Graff-Guerrero, A., Woo, V.L.,
Kumar, S., Colman, S., Pollock, B.G., Mulsant, B.H. and Rajji, T.K., 2018. Sequential
drug treatment algorithm for agitation and aggression in Alzheimer’s and mixed
dementia. Journal of Psychopharmacology, 32(5), pp.509-523.
Diekmann, C., Michaelis, J., Haslbeck, M. and Carle, G., 2016, May. Verified iptables
firewall analysis. In 2016 IFIP Networking Conference (IFIP Networking) and
Workshops (pp. 252-260). IEEE.
Filimonoff, A., Klimova, A. and Muravyov, A., 2019. Experience of Using Multilayer
Virtual Partitioning in Laboratory Complex Construction. EdCRUNCH Ural: новые
образовательные технологии в вузе–2019.—Екатеринбург, 2019, pp.129-140.
Kovach, J. and Sadler, L., 2019. Integrated Sensor Architecture (ISA) Database/Media
Storage Tool Software Package Documentation (No. ARL-TR-8768). CCDC Army
Research Laboratory Adelphi United States.
Laracy, J.R. and Greenspan, R., 2019. Towards a Rigorous Software Architecture
Documentation Process: A Demonstration with the Real-time Immersive Network
Simulation Environment (RINSE). IJO-International Journal Of Computer Science and
Engineering, 2(12), pp.01-33.
Li, F. and Hong, J., 2016. Efficient certificateless access control for wireless body area
networks. IEEE sensors journal, 16(13), pp.5389-5396.
López-Pérez, D., Laselva, D., Wallmeier, E., Purovesi, P., Lundén, P., Virtej, E.,
Lechowicz, P., Malkamaki, E. and Ding, M., 2016. Long term evolution-wireless local
area network aggregation flow control. IEEE Access, 4, pp.9860-9869.
Mestres, A., Rodriguez-Natal, A., Carner, J., Barlet-Ros, P., Alarcón, E., Solé, M.,
MuntésMulero, V., Meyer, D., Barkai, S., Hibbett, M.J. and Estrada, G., 2017.
Knowledge-defined networking. ACM SIGCOMM Computer Communication Review,
47(3), pp.2-10.
Schmitz, C., 2020. MBS Network Plugin Documentation.
Shakya, A., Prasad, P.W.C., Alsadoon, A., Zajko, G. and Elchouemi, A., 2016,
November. Development of the Wireless Cisco Networking Laboratory Pod. In 2016
International Conference on Advances in Electrical, Electronic and Systems Engineering
(ICAEES) (pp. 208- 213). IEEE.
Singhal, A. and Ou, X., 2017. Security risk analysis of enterprise networks using
probabilistic attack graphs. In Network Security Metrics (pp. 53-73). Springer, Cham.
Waliullah, M., Moniruzzaman, A.B.M. and Rahman, M.S., 2015. An experimental study
analysis of security attacks at ieee 802. 11 wireless local area network. International
Journal of Future Generation Communication and Networking, 8(1), pp.9-18.