Bright is a business initiative whose business operational processes relies so much to Information technology in its day-to-day activities. For instance, for a client to receive a service in Bright grounds, the client has to check-in with a ticket for her to access any kind of service. The administration has therefore decided to come up with a type of network design that will support competently business processes. Bright company has therefore been contracted us to come up with a network design that will support the business functionalities. In this piece of paper, we will be providing the network model on how our real network will be.
Network Design Goals
The network to be executed has to hit the following major technical requirements:
Probable users
The key envisioned users of the Bright network are the management namely: human finance, finance and the resource departments. Supplementary departments such as sales and engineering will require usage of the network but not as much as likened to later three. Furthermore, visitors and customers will be inactive users of the network since they will either necessitate the output of the network for them to be served or will need network infrastructure to get what they requisite.
Bright Project requirements
To put up our network up running, the following tabulated hardware components have to be availed.
Name of item |
Specifications |
Required Quantity |
Justification |
Layer 3 Switch |
Ø VLAN features Ø Routing capability Ø STP enabled |
1 |
Layer 3 switch will be used to perform inter-VLAN routing roles. |
Wireless router |
Ø USB port-1 Ø Flash memory: 256mb Ø LAN interface 4 fa Ports Ø Auxiliary port: RJ 45 single port Ø DRAM : 512MB |
2 |
Wireless router will be deployed to support wireless computing devices |
Server |
Ø Processor number:26 Ø Processor family: intel Ø Processor speed: 3.7 Ghz Ø Max memory: 2 TB Ø Cache level: l3 38.80 Ø Memory slots: 18 DIMM |
2 |
One server will be used to host DHCP and DNS services, another one will host print, file sharing, mailing and messaging services. |
Firewall |
Ø Cyber-roam |
1 |
Cyber roam firewall will be used to monitor outgoing and incoming traffic |
Switch |
Ø Fast Ethernet ports-48 Ø DRAM: 128 MB Ø Flash memory-64 MB Ø Model- 2900 series Cisco Switch |
5 |
Each department necessitates a single switch (5*1=5). The switches will be needed for network extension |
Router |
Ø Interface card slots: 4 Ø Flash memory:128 MB Ø Network slot: 1 Ø USB ports-2 Ø Dram: 512 MB |
1 |
Router is required to route outgoing traffic and route incoming traffic too. |
Non-functional requirements
Device name |
Quantity |
Justification |
Cabinets |
5 |
For covering switches and servers |
Trunking |
45 pieces |
For housing of network cables |
RJ 45 clips |
1500 |
For termination of patch codes |
Patrice boxes |
170 pieces |
For termination of wall patch codes |
UPS |
5 |
For power backup in the switch and server cabinets |
Patch panel |
5 |
For cable organisation |
Network Design
IP Addressing
LAN area |
No of Nodes |
Octet |
NA |
First Usable Address |
LUA |
Mask |
Finance |
30 |
32 |
172.16.200.0 |
172.16.200.0 |
172.16.200.1 |
/27 |
Human Resource |
30 |
32 |
172.16.200.32 |
172.16.200.33 |
172.16.200.62 |
/27 |
Administration |
30 |
32 |
172.16.200.64 |
172.16.200.65 |
172.16.200.94 |
/27 |
Engineering |
30 |
32 |
172.16.200.96 |
172.16.200.97 |
172.16.200.126 |
/27 |
Sales |
30 |
32 |
172.16.200.128 |
172.16.200.129 |
172.16.200.158 |
/27 |
Distribution Layer Switch Configuration
Step A: Clearing the Startup configuration File
Switch>
Switch>
Switch>ena
Switch#era start
Switch#reload
Proceed with reload? [Confirm]
Step 2: Switch Configuration
Switch>
Switch>
Switch>ena
Switch#confi ter
Switch(config)#banner motd @Don’t tamper with DSL [email protected]
Switch(config)#ser pass
Switch(config)#lin c 0
Switch(config-line)#pass password
Switch(config-line)#login
Switch(config-line)#logg sy
Switch(config-line)#lin vty 0 15
Switch(config-line)#login
Switch(config-line)#pass password
Switch(config-line)#logi
Switch(config-line)#logg sy
Switch(config-line)#exi
Switch(config)#vlan 10
Switch(config-vlan)#name ADMIN
Switch(config-vlan)#inter vlan 10
Switch(config-if)#ip add 172.16.200.1 255.255.255.224
Switch(config-if)#no shu
Switch(config-if)#vlan 11
VLAN 11 added:
Name:VLAN0011
Switch(config-vlan)#nam HR
Switch(config-vlan)#
Switch(config-vlan)#inter vlan 11
Switch(config-if)#ip add 172.16.200.33 255.255.255.224
Switch(config-if)#no shu
Switch(config-if)#vla 12
VLAN 12 added:
Name:VLAN0012
Switch(config-vlan)#nam Finance
Switch(config-vlan)#inter vla 12
Switch(config-if)#ip add 172.16.200.65 255.255.255.224
Switch(config-if)#no shu
Switch(config-if)#vla 13
VLAN 13 added:
Name:VLAN0013
Switch(config-vlan)#name Engineering
Switch(config-vlan)#inter vla 13
Switch(config-if)#ip add 172.16.200.97 255.255.255.224
Switch(config-if)#no shu
Switch(config-if)#vla 14
VLAN 14 added:
Name:VLAN0014
Switch(config-vlan)#nam Sales
Switch(config-vlan)#int vl1 14
Invalid Command
Switch(config)#inter vla 14
Switch(config-if)#ip add 172.16.200.129 255.255.255.224
Switch(config-if)#no shu
Switch(config-if)#inter fa0/1
Switch(config-if)#no swit
Switch(config-if)#ip add 222.222.222.2 255.255.255.0
Switch(config-if)#no shu
Switch(config-if)#ip route 0.0.0.0 0.0.0.0 222.222.222.1
Switch(config)#end
Switch#copy run start
Destination filename [startup-config]?
Building configuration…
[6]
Router configuration
Router>ena
Router#era start
Router#reloa
Proceed with reload? [confirm]
Building simulated configuration…
Router>
Router>
Router>ena
Router#conf ter
Router(config)#bann motd %This is Our Core Router, handle it Carefully%
Router(config)#lin c 0
Router(config-line)#pass password
Router(config-line)#logi
Router(config-line)#logg sy
Router(config-line)#lin vty ?
Router(config-line)#exi
Router(config)#line vty ?
<0-4> <0-4> First Line number
Router(config)#line vty 0 4
Router(config-line)#pass password
Router(config-line)#logg sy
Router(config-line)#logi
Router(config-line)#exi
Router(config)#host CoreRouter
CoreRouter(config)#enab sec password
CoreRouter(config)#servi pass
CoreRouter(config)#inter f0/0
CoreRouter(config-if)#no shu
CoreRouter(config-if)#ip add 222.222.222.1 255.255.255.0
Router DHCP configuration
Router>
Router>ena
Router#conf ter
Router(config)#bann motd %This is Our Core Router, handle it Carefully%
Router(config)#lin c 0
Router(config-line)#pass password
Router(config-line)#logi
Router(config-line)#logg sy
Router(config-line)#lin vty ?
Router(config-line)#exi
Router(config)#line vty ?
<0-4> <0-4> First Line number
Router(config)#line vty 0 4
Router(config-line)#pass password
Router(config-line)#logg sy
Router(config-line)#logi
Router(config-line)#exi
Router(config)#host CoreRouter
CoreRouter(config)#enab sec password
CoreRouter(config)#servi pass
CoreRouter(config)#inter f0/0
CoreRouter(config-if)#no shu
CoreRouter(config-if)#ip add 222.222.222.1 255.255.255.0
CoreRouter(config-if)#exi
CoreRouter(config)#ip dhcp pool Bright_LAN
CoreRouter(dhcp-config)#leas 4 15 10
CoreRouter(dhcp-config)#network 172.16.200.0
CoreRouter(dhcp-config)#dns-server 172.16.200.67
CoreRouter(dhcp-config)#default-router 222.222.222.1
CoreRouter(dhcp-config)#exi
CoreRouter(config)#ip dhcp excluded-address 172.16.200.65 172.16.200.70
CoreRouter(config)#inter fa 0/0
CoreRouter(config-if)#ip helper-address 172.16.200.67
CoreRouter(config-if)#end
CoreRouter#copy run start
Destination filename [startup-config]?
Building configuration…
Server Configuration
DHCP Server Configuration
In our Bright technology network implementation project, Windows 2012R server will be used to host DNS and DHCP services for our network. Pictured below is configuration steps for both DNS and DHCP services
Security configuration
Security characteristic is important to any business initiative. It is necessary to keep at the fence cyber-intrusion activities that would in one way business operational activities down to its knees. Wang exclaims, “Prevention is better than cure.” Nevertheless we may say we are keeping cyber-attacks at a far distance, this cannot be enough, as worker education about cyber-attacks is important too. To attain internal security controls, our project is going to apply access lists on our Core router to ensure that the concerned traffic does not get away into limited zones. For example, traffic should not flow from engineering and sales department to finance department. It is of value to point out too that cyberoam will be deployed to monitor both outgoing and incoming traffic [9]. Below is access list configuration applied on router below.
CoreRouter#conf ter
CoreRouter(config)#access-list 120 deny tcp 172.16.200.96 0.0.0.64 172.16.200.64 0.0.0.32
CoreRouter(config)#access-list 120 permit tcp 172.16.200.96 0.0.0.64 172.16.200.200 0.0.0.0
CoreRouter(config)#access-list 120 permit ip any any
CoreRouter(config)#interface f0/0
CoreRouter(config-if)#ip access-group 120 in
CoreRouter(config-if)#exi
CoreRouter(config)#exi
CoreRouter#copy run start
Destination filename [startup-config]?
References
S. Noble, Building Modern Networks, Birmingham: Packt Publishing Ltd, 2017.
P. Ciccarelli, . Faulkner and . FitzGerald, Introduction to Networking Basics, Hoboken: John Wiley & Sons, 2012.
T. Szigeti, . Hattingh and . Barton, End-to-End QoS Network Design: Quality of Service for Rich-Media & Cloud, Indinapolis: Cisco Press, 2013.
Kavian and Y. S., Intelligent Systems for Optical Networks Design: Advancing Techniques, Hershey: IGI Global, 2013.
M. Jacot, . Jacot and . Bali, Advanced Tuning for JD Edwards EnterpriseOne Implementations, New York City: McGraw Hill Professional, 2013 .
T. Lammle and . Montgomery, CCNA Data Center: Introducing Cisco Data Center Technologies Study Guide, Hoboken: John Wiley & Sons, 2016 .
M. Duggan, Cisco CCIE Routing and Switching v5.0 Configuration Practice Labs, Indianapolis: Cisco Press, 2014.
M. M. Alani, Guide to Cisco Routers Configuration: Becoming a Router Geek, New York City: Springer, 2017.
L. Wang, . Jajodia and . Singhal, Network Security Metrics, New York City: Springer, 2017 .
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download