0% found this document useful (0 votes)
62 views

PART (1) : Assignment Brief and Guidance: (Scenario)

Uploaded by

Minh Tuấn Ngô
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views

PART (1) : Assignment Brief and Guidance: (Scenario)

Uploaded by

Minh Tuấn Ngô
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Assignment Brief and Guidance:( Scenario)

The assignment consists of two parts: theoretical and practical.


You are a junior network administrator. You are requested to research different network topologies and
protocols, set up a small network in Packet Tracer software, configure devices on the network, and verify
the connectivity.

Part 1.
In this part, you will critically evaluate different topologies and protocols. You will use your research to
demonstrate the efficient utilisation of the networking system in Part 2.

Answer the following questions:


 Compare common networking principles and explain how protocols enable the effectiveness of
networked systems.
 A discussion of the various benefits and constraints relating to different network types and
standards.
 An explanation of the impact different network topologies have on communication and bandwidth
requirements.

Explain the hardware and operations involved in networking:


 Explore the range of available server types and explain the difference with regard to cost and
performance optimisation.

You will need to produce a discussion of the operating principles of the main networking devices and server
types and relate this to the interdependence of workstation hardware to the appropriate networking software.

PART (1)
Compare common networking principles and explain how protocols enable the effectiveness of networked
systems?

There are different principles of networking:

1. The packet switching principle is used to store and forward the packet.

2. The transmission of the packet is another principles

3. The routing in the network is another scheme.

4. The switching of the network is another principle of networking.

Pearson Education 2016


Higher Education Qualifications
Summative Assignment Feedback Form
5. The delivery of the packets is another principle of networking.

So, there are different principles of networking that include the switching, transmission, switching of the
network, and routing in the networks. There are also internetworking and congestion control principles.

The protocols in networking are:

1. The TCP/IP protocol is an internet protocol used for the transmission of data packets over the internet.
They are connected and provide always delivery to the users; this protocol is used in the Transport layer of
the internet layers protocol. The TCP/IP is a connection-oriented protocol and guarantees the delivery of the
packet.

2. UDP protocol: This is the user datagram protocol, is a connectionless protocol, this does not guarantee
delivery of the packet. This is used in wireless connections for transmission it is fast but not guaranteed.

A discussion of the various benefits and constraints relating to different


network types and standards.

The benefits and constraints of different Benifits and constraints of network types are Personal area network

network types and standards are:

Advantages

1)no extra space require for connecting two devices you need to enable Bluetooth on both

devices.

2)it can connect to many devices at a time

3)it is east to use no advanced set is required.

4)cost effective no extra wires required

Disadvantages

1)less distance range minimum 10 meters.

2)slow data transfer

3) interface with radio signals PAN use

infrared.

Local area network:

Advantages are

Pearson Education 2016


Higher Education Qualifications
Summative Assignment Feedback Form
1) it can connect network devices over short

distance

2)easy and cheap communication

Data and message can be easily shared with other computers connected to the

network.

3)software application sharing in LAN it is easy to use the same software in number of computers connected
to a network.

4)resource sharing computer resource like printer,scanner,modems,hard disk can shred within the connected
devices.

Disadvantages are

1)High setup cost initially setup cost of installing local area network is high. 2)covers limited area

3)data security threat

Unauthorized users can access data of an

office or campus if server hard disk is not properly secured by LAN administrator.

4)privacy violation

Wide area network (WAN)

Advantages

1) it cover more than 1000 km.we can connect different offices branches through WAN. 2)high bandwidth it
has high bandwidth then

LAN

3)get updated files and data WAN prove

facility of getting updated files and data from

server.

4) centralized data sharing of data to all

connected devices in the network

5) resource sharing

Pearson Education 2016


Higher Education Qualifications
Summative Assignment Feedback Form
Disadvantages

1)security problems

2)need anti-virus and firewall because of security issues.

3)setup cost is high it is very expensive at initial stage

4) troubleshooting problem because it covers large area it is difficult to fix the problem.

Metropolitan area network (MAN)

Advantages
1) less expensive

2)sending local emails using MAN we can send local email fast and free
3) high speed of WAN. MAN uses fibre optics so, it can transfer data fast.

Disadvantages

1) more wires are required in MAN we require additional cables to connect to LAN

2) difficult to manage if MAN becomes big difficult to manage.

3)internet speed difference

Standards advantages and disadvantages are


1) reducing costs

2)increasing productivity

3) quality assurance

4)minimization of waste

5) ensuring safety

Disadvantages are
1) standard force to change the methods.

2)standard do not prevent bugs.

3)standard reduce productivity by forcing unnecessary actions.

Pearson Education 2016


Higher Education Qualifications
Summative Assignment Feedback Form
An explanation of the impact different network topologies have on
communication and bandwidth requirements.

On the note of impact: network topology

• In case of Network topology, there are various kinds of configuration for the network based on topology or how the
hardware is arranged in the network.

• This can highly impact the efficiency of the network requirements.

• Example. A bus network topology would have a different efficiency over a start topology looking at the examples.

1. LAN: Stands for Local Area network which is a group of computers connected together being

in the same geographical locations. E.g. Education institutions

2. MAN: Stands for metropolitan area network is a large network that usually covers many building that are in same
area, much larger than a city etc.

3. WAN:

Stands for Wide area network, WAN is not limited to a single area, it is wide as wide as state or nation's network.
Internet is an example.

Explain the hardware and operations involved in networking:


Explore the range of available server types and explain the difference with regard
to cost and performance optimisation

Network hardware can be classified by its location and role in the network.

Core
Core network components interconnect other network components.

Gateway: an interface providing a compatibility between networks by converting transmission speeds, protocols,
codes, or security measures.[2]
Router: a networking device that forwards data packets between computer networks. Routers perform the "traffic
directing" functions on the Internet. A data packet is typically forwarded from one router to another through the
networks that constitute the internetwork until it reaches its destination node.[3] It works on OSI layer 3.[4]
Switch: a device that connects devices together on a computer network, by using packet switching to receive, process
and forward data to the destination device. Unlike less advanced network hubs, a network switch forwards data only
to one or multiple devices that need to receive it, rather than broadcasting the same data out of each of its ports.[5] It

Pearson Education 2016


Higher Education Qualifications
Summative Assignment Feedback Form
works on OSI layer 2.
Bridge: a device that connects multiple network segments. It works on OSI layers 1 and 2.[6]
Repeater: an electronic device that receives a signal and retransmits it at a higher level or higher power, or onto the
other side of an obstruction, so that the signal can cover longer distances.[7]
Repeater hub: for connecting multiple Ethernet devices together and making them act as a single network segment. It
has multiple input/output (I/O) ports, in which a signal introduced at the input of any port appears at the output of
every port except the original incoming.[1] A hub works at the physical layer (layer 1) of the OSI model.[8] Repeater
hubs also participate in collision detection, forwarding a jam signal to all ports if it detects a collision. Hubs are now
largely obsolete, having been replaced by network switches except in very old installations or specialized applications.
Wireless access point
Structured cabling
Hybrid
Hybrid components can be found in the core or border of a network.

Multilayer switch: a switch that, in addition to switching on OSI layer 2, provides functionality at higher protocol
layers.
Protocol converter: a hardware device that converts between two different types of transmission, for interoperation.[9]
Bridge router (router): a device that works as a bridge and as a router. The brouter routes packets for known protocols
and simply forwards all other packets as a bridge would.[10]
Border
Hardware or software components which typically sit on the connection point of different networks (for example,
between an internal network and an external network) include:

Proxy server: computer network service which allows clients to make indirect network connections to other network
services.[11]
Firewall: a piece of hardware or software put on the network to prevent some communications forbidden by the
network policy.[12] A firewall typically establishes a barrier between a trusted, secure internal network and another
outside network, such as the Internet, that is assumed to not be secure or trusted.[13]
Network address translator (NAT): network service (provided as hardware or as software) that converts internal to
external network addresses and vice versa.[14]
Residential gateway: interface between a WAN connection to an internet service provider and the home network.
End stations
Other hardware devices used for establishing networks or dial-up connections include:

Network interface controller (NIC): a device connecting a computer to a wire-based computer network.
Wireless network interface controller: a device connecting the attached computer to a radio-based computer network.
Modem: device that modulates an analogy "carrier" signal (such as sound) to encode digital information, and that also
demodulates such a carrier signal to decode the transmitted information. Used (for example) when a computer
communicates with another computer over a telephone network.
ISDN terminal adapter (TA): a specialized gateway for ISDN.
Line driver: a device to increase transmission distance by amplifying the signal; used in base-band networks only.

We have many ranges of server's types available. Each of them is designed and work on basis of different
configurations. According to the market need and demand we can use the servers. Some types of servers are as
follows

Rack Server

This server is mounted inside a rack. Self- contained, means can run as a stand-alone or networked system: its own
power source, CPU, and memory. This allows to run intensive computing operations. They are highly efficient to
expand with additional memory, storage, and processors. Also, smaller deployments make energy efficiency at lower

Pearson Education 2016


Higher Education Qualifications
Summative Assignment Feedback Form
cost. Since racks are densely populated which require more cooling units, which raises energy costs. Also, this makes
the miniatous more difficult as it takes more troubleshooting and management time.

• Blade Server

It is a server enclosure that houses multiple modular circuit boards called server

blades. Their modern architecture supports hot swaps. Blades have small external handles, so it's a simple matter to
pull out or replace them. They can scale to high performance levels, if the data centre has enough energy to support
the dense infrastructure. IN this server it provides high processing power while taking up minimal space. Also, it
allows to host primary operating systems, databases, applications, web services, and other enterprise processes and
applications which satisfies a multipurpose. But disadvantage is that due to high density blade servers require
advanced climate control which increase the energy cost.

• Tower Servers

They are a stand-alone chassis configuration. This server allows their customers to customize their servers and
maintain a customized upgrade path. For a smaller business that needs a single powerful server to run multiple
processes and applications this will be highly a good option. They can share network storage like any other type of
server. With their low component density, towers are less expensive to cool than other two servers. They are more
scalable as they allow IT to customize and upgrade them based on business needs which are less
expensive.Eventhough it allows customization high-end hardware components and software will raise the ongoing
price considerably which highly increase the upgrading cost.

Virtual Server

It helps to reduce the distance among shared and hosting servers providing freedom to others, at a less cost. Now
adays its very popular among the data centres. So, the above discussed servers are the physical servers and here in
virtual server we see how this gives a broader view and its benefits. Some of its advantageous are : They empower
users to go beyond the limitations of hardware to achieve their end goals, provide centralized management and Full
compatibility with applications, allows migration of servers to new hardware transparently, cost reduction is possible
using small virtual servers less downtime, easy to change the virtual machine platform and increase its

performance, virtualization software reallocates hardware resources dynamically between a virtual machine and
another.

In short we can say that virtual servers are giving more benefits as it can solve and facilitate a number of operations to
avoid any kind of crisis more cost effective without compromising the performance.

Pearson Education 2016


Higher Education Qualifications
Summative Assignment Feedback Form
Part 2.
Building a Switch and Router Network
Topology

Addressing Table

Device Interface IP Address Subnet Mask Default Gateway

G0/0 192.168.0.1 255.255.255.0 N/A


R1
G0/1 192.168.1.1 255.255.255.0 N/A
PC-A NIC 192.168.1.3 255.255.255.0 192.168.1.1
PC-B NIC 192.168.0.3 255.255.255.0 192.168.0.1

Background / Scenario
In this exercise you will connect the equipment in Packet Tracer as shown in the topology diagram. You will then
configure the devices to match the addressing table. After the configurations have been saved, you will verify your
configurations by testing for network connectivity.
After the devices have been configured and network connectivity has been verified, you will use IOS commands
to retrieve information from the devices to answer questions about your network equipment.

Network Devices
 1 Router (Cisco 1941)
 1 Switch (Cisco 2960)
 2 PCs
 Console cables to configure the Cisco IOS devices via the console ports
 Ethernet cables as shown in the topology
Note: The Gigabit Ethernet interfaces on Cisco 1941 routers are autosensing and an Ethernet straight-through
cable may be used between the router and PC-B. If using another model Cisco router, it may be necessary to use
an Ethernet crossover cable.

Part 1: Set Up Topology and Initialize Devices


Step 1: Connect the network as shown in the topology using appropriate media.
Attach the devices shown in the topology diagram, and cable, as necessary.

Pearson Education 2016


Higher Education Qualifications
Summative Assignment Feedback Form
Step 2: Initialize and reload the router and switch.
If configuration files were previously saved on the router and switch, initialize and reload these devices back to
their basic configurations.

Part 2: Configure Devices and Verify Connectivity


In Part 2, you will set up the network topology and configure basic settings, such as the interface IP addresses,
device access, and passwords. Refer to the Topology and Addressing Table at the beginning of this lab for device
names and address information.

Step 1: Assign static IP information to the PC interfaces.


1. Configure the IP address, subnet mask, and default gateway settings on PC-A.
2. Configure the IP address, subnet mask, and default gateway settings on PC-B.
3. Ping PC-B from a command prompt window on PC-A.
Why were the pings not successful?
____ The router interfaces, default gateways, have not been configured yet so Layer 3 traffic is not being
routed between subnets___________________________

Step 2: Configure the router.


1. Console into the router and enable privileged EXEC mode.
2. Enter configuration mode.
Router# configure terminal
3. Assign a device name to the router.
Router(config)#hostname R1
4. Disable DNS lookup to prevent the router from attempting to translate incorrectly entered commands as
though they were host names.
R1(config)#no ip domain-lookup
5. Assign class as the privileged EXEC encrypted password.
R1(config)#enable secret class
6. Assign cisco as the console password and enable login.
R1(config)#line console 0
password cisco
login
logging synchronous

7. Assign cisco as the VTY password and enable login.


R1(config)#line vty 0 15
password cisco
login
8. Encrypt the clear text passwords.
R1(config)#service password-encryption
9. Create a banner that warns anyone accessing the device that unauthorized access is prohibited.
R1(config)#banner motd $ Unauthorised Access Prohibited! $
10. Configure and activate both interfaces on the router.
Router(config)#interface fastEthernet 0/0
ip address <IP ADDRESS> <SUBNET MASK>
no shutdown
Router(config)#interface fastEthernet 0/1

Pearson Education 2016


Higher Education Qualifications
Summative Assignment Feedback Form
ip address <IP ADDRESS> <SUBNET MASK>
no shutdown
11. Configure an interface description for each interface indicating which device is connected to it.
Router(config)#interface fastEthernet 0/0
description Connection to PC-B
Router(config)#interface fastEthernet 0/1
description Connection to S1 on F0/5
12. Save the running configuration to the startup configuration file.
Router(config)#copy running-configuration startup-configuration
13. Set the clock on the router.
Note: Use the question mark (?) to help with the correct sequence of parameters needed to execute this
command.
14. Ping PC-B from a command prompt window on PC-A.
Were the pings successful? Why?
______________ Yes, The router is rounding the ping traffic across the two Part Display to Part 3 subnets.
The default settings for the 2960 switch Step 1: Retrieve hardware and software information fromE Use Status
will automatically turn up the interfaces that are connected to devices
__________________________________________________________

Part 3: Display Device Information


In Part 3, you will use show commands to retrieve information from the router and switch.

Step 1: Retrieve hardware and software information from the network devices.
1. Use the show version command to answer the following questions about the router.
What information can you see?
R1# show versionCisco IOS Software, C1900 Software (C1900-UNIVERSALK9-M),
Version 15.2(4)M3, RELEASE SOFTWARE (fc1)Technical Support:
http://www.cisco.com/techsupportCopyright (c) 1986-2012 by Cisco Systems,
Inc.Compiled Thu 26-Jul-12 19:34 by prod_rel_teamROM: System Bootstrap,
Version 15.0(1r)M15, RELEASE SOFTWARE (fc1)R1 uptime is 10 minutesSystem
returned to ROM by power-onSystem image file is “flash0:c1900-universalk9-
mz.SPA.152-4.M3.bin”Last reload type: Normal ReloadLast reload reason:
power-onThis product contains cryptographic features and is subject to
UnitedStates and local country laws governing import, export, transfer
anduse. Delivery of Cisco cryptographic products does not implythird-party
authority to import, export, distribute or use encryption.Importers,
exporters, distributors and users are responsible forcompliance with U.S.
and local country laws. By using this product youagree to comply with
applicable laws and regulations. If you are unableto comply with U.S. and
local laws, return this product immediately.A summary of U.S. laws
governing Cisco cryptographic products may be found
at:http://www.cisco.com/wwl/export/crypto/tool/stqrg.htmlIf you require
further assistance please contact us by sending email to
[email protected].

Cisco CISCO1941/K9 (revision 1.0) with 446464K/77824K bytes of memory.


Processor board ID FTX1636848Z
2 Gigabit Ethernet interfaces

Pearson Education 2016


Higher Education Qualifications
Summative Assignment Feedback Form
2 Serial(sync/async) interfaces
1 terminal line
DRAM configuration is 64 bits wide with parity disabled.
255K bytes of non-volatile configuration memory.
250880K bytes of ATA System CompactFlash 0 (Read/Write)

License Info:

License UDI:

————————————————-
Device# PID SN
————————————————-
*0 CISCO1941/K9 FTX1636848Z

Technology Package License Information for Module:’c1900′

—————————————————————–
Technology Technology-package Technology-package
Current Type Next reboot
——————————————————————
ipbase ipbasek9 Permanent ipbasek9
security None None None
data None None None

Configuration register is 0x2142 (will be 0x2102 at next reload)

____________________________________________________________________________________

Switch# show versionCisco IOS Software, C2960 Software (C2960-LANBASEK9-M),


Version 15.0(2)SE, RELEASE SOFTWARE (fc1)Technical Support:
http://www.cisco.com/techsupportCopyright (c) 1986-2012 by Cisco Systems,
Inc.Compiled Sat 28-Jul-12 00:29 by prod_rel_teamROM: Bootstrap program is
C2960 boot loaderBOOTLDR: C2960 Boot Loader (C2960-HBOOT-M) Version

Pearson Education 2016


Higher Education Qualifications
Summative Assignment Feedback Form
12.2(53r)SEY3, RELEASE SOFTWARE (fc1)S1 uptime is 1 hour, 2 minutesSystem
returned to ROM by power-onSystem image file is “flash:/c2960-lanbasek9-
mz.150-2.SE.bin”This product contains cryptographic features and is subject
to UnitedStates and local country laws governing import, export, transfer
and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found


at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to


[email protected].

cisco WS-C2960-24TT-L (PowerPC405) processor (revision R0) with 65536K


bytes of memory.
Processor board ID FCQ1628Y5LE
Last reset from power-on
1 Virtual Ethernet interface
24 FastEthernet interfaces
2 Gigabit Ethernet interfaces
The password-recovery mechanism is enabled.

64K bytes of flash-simulated non-volatile configuration memory.


Base ethernet MAC Address : 0C:D9:96:E2:3D:00
Motherboard assembly number : 73-12600-06
Power supply part number : 341-0097-03
Motherboard serial number : FCQ16270N5G
Power supply serial number : DCA1616884D
Model revision number : R0
Motherboard revision number : A0
Model number : WS-C2960-24TT-L
System serial number : FCQ1628Y5LE
Top Assembly Part Number : 800-32797-02
Top Assembly Revision Number : A0
Version ID : V11
CLEI Code Number : COM3L00BRF
Hardware Board Revision Number : 0x0A

Switch Ports Model SW Version SW


Image
—— —– —– ———- ———-

Pearson Education 2016


Higher Education Qualifications
Summative Assignment Feedback Form
* 1 26 WS-C2960-24TT-L 15.0(2)SE C2960-LANBASEK9-
M

Configuration register is 0xF

Switch#

Step 2: Display the routing table on the router.


Use the show ip route command on the router to answer the following questions.
What code is used in the routing table to indicate a directly connected network? _____ L local_____
How many route entries are coded with a C code in the routing table? _____2____
What interface types are associated to the C coded routes?
_______ GigabitEthernet0/0 ________ GigabitEthernet0/1 _____________________________

Step 3: Display a summary list of the interfaces on the router and switch.
There are several commands that can be used to verify an interface configuration. One of the most useful of these
is the show ip interface brief command. The command output displays a summary list of the interfaces on the
device and provides immediate feedback to the status of each interface.
1. Enter the show ip interface brief command on the router.
R1# show ip interface brief
Interface IP-Address OK? Method Status Protocol
Embedded-Service-Engine0/0 unassigned YES unset administratively down down
GigabitEthernet0/0 192.168.0.1 YES manual up up
GigabitEthernet0/1 192.168.1.1 YES manual up up
Serial0/0/0 unassigned YES unset administratively down down
Serial0/0/1 unassigned YES unset administratively down down
R1#

2. Enter the show ip interface brief command on the switch.


Switch# show ip interface brief
Interface IP-Address OK? Method Status Protocol
Vlan1 unassigned YES manual up up
FastEthernet0/1 unassigned YES unset down down
FastEthernet0/2 unassigned YES unset down down
FastEthernet0/3 unassigned YES unset down down
FastEthernet0/4 unassigned YES unset down down
FastEthernet0/5 unassigned YES unset up up
FastEthernet0/6 unassigned YES unset up up
FastEthernet0/7 unassigned YES unset down down
FastEthernet0/8 unassigned YES unset down down
FastEthernet0/9 unassigned YES unset down down
FastEthernet0/10 unassigned YES unset down down
FastEthernet0/11 unassigned YES unset down down
FastEthernet0/12 unassigned YES unset down down
FastEthernet0/13 unassigned YES unset down down

Pearson Education 2016


Higher Education Qualifications
Summative Assignment Feedback Form
FastEthernet0/14 unassigned YES unset down down
FastEthernet0/15 unassigned YES unset down down
FastEthernet0/16 unassigned YES unset down down
FastEthernet0/17 unassigned YES unset down down
FastEthernet0/18 unassigned YES unset down down
FastEthernet0/19 unassigned YES unset down down
FastEthernet0/20 unassigned YES unset down down
FastEthernet0/21 unassigned YES unset down down
FastEthernet0/22 unassigned YES unset down down
FastEthernet0/23 unassigned YES unset down down
FastEthernet0/24 unassigned YES unset down down
GigabitEthernet0/1 unassigned YES unset down down
GigabitEthernet0/2 unassigned YES unset down down
Switch#

Reflection
1. If the G0/1 interface showed administratively down, what interface configuration command would you use to turn
the interface up?
________________no shutdown_______________________________________________
2. What would happen if you had incorrectly configured interface G0/1 on the router with an IP address of
192.168.1.2?
_______________________ PC-A would not be able to ping PE-B..This is because

192 168 PC-B is on a different network than PC-A which requires the default gateway router to
route these packets. PC-A is configured to use the IP address of 192.168.1.1 for the default-
gateway router, but this address is not assigned to any device on the LAN. Any Real Time packets
that need to be sent to the default-gateway for- routing will never reach their destination

Learning Outcomes and Assessment Criteria:


Learning Outcome Pass Merit Distinction
LO1 Examine P1 Discuss the benefits M1 Compare common D1 Critically evaluate
networking principles and constraints of networking principles the topology protocol
and their protocols different network types and how protocols selected for a given
and standards. enable the effectiveness scenario to demonstrate
P2 Explain the impact of of networked systems. the efficient utilisation of
network topology, a networking system.
communication and
bandwidth requirements
LO2 Explain networking P3 Discuss the operating M2 Explore a range of D2 Critically evaluate
devices and operations principles of networking server types and justify the topology protocol
devices and server types. the selection of a server, selected for a given
P4 Discuss the considering a given scenario to demonstrate
interdependence of scenario regarding cost the efficient utilisation of

Pearson Education 2016


Higher Education Qualifications
Summative Assignment Feedback Form
workstation hardware and performance a networking system.
with relevant networking optimisation.
software.

Pearson Education 2016


Higher Education Qualifications
Summative Assignment Feedback Form

You might also like