0% found this document useful (1 vote)
46 views21 pages

SWIT (Final Assignment)

Uploaded by

yew chun
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (1 vote)
46 views21 pages

SWIT (Final Assignment)

Uploaded by

yew chun
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

1

Marking Scheme
Marks Allocation

Student’s Name : Chan Chun Yew, Gerard Sanjeev Raj, Stephen Elliot Heong Chi
Wah, Navitha A/P Pusbanathan

Documentation 5% Navitha

Report Content 10 % Gerard

Network Plan 10 % Chan

Analytical & Critical Thinking 10 % Stephen

Research & References 5% Navitha

40 %

TOTAL

2
Marks Allocation (60%)

Student’s Name : Chan Chun Yew, Gerard Sanjeev Raj,


Stephen Elliot Heong Chi Wah, Navitha A/P Pusbanathan

Install & Configure 20%

Troubleshooting VLAN 10%

(Q & A)
Inter VLAN Routing 10%

Access Control List 10%

WAN Technology 10%

TOTAL 60%

3
Workload Matrix

Task Chan Chun Stephen Elliot Gerard Navitha A/P


Yew Heong Chi Sanjeev Raj Pusbanathan
(TP057374) Wah
(TP056823) (TP068096)
(TP057160)

Introduction 100%

Network Plan/layout 100%

Common issues in 100%


VLAN

Importance of 100%
Spanning Tree
Algorithm (STA) to
solve issues in VLAN

WAN Switching 50% 50%


Technology

Conclusion 50% 50%

4
Contents
1.0 Introduction ........................................................................................................................... 6
2.0 Network Plan/Layout of CPLC .................................................................................................... 6
2.1 The 4th Floor: ........................................................................................................................... 7
2.2 The 3rd Floor: ........................................................................................................................... 8
2.3 The 2nd Floor: .......................................................................................................................... 9
2.4 The 1st Floor: ......................................................................................................................... 10
2.5 The Ground Floor: ................................................................................................................. 11
3.0 Common Issues in VLAN .......................................................................................................... 12
4.0 Importance of Spanning Tree Algorithm(STA) to solve issues in VLAN .................................... 12
5.0 VLAN Management .................................................................................................................. 14
6.0 WAN Switching Technology ..................................................................................................... 18
7.0 Conclusion ................................................................................................................................ 19
7.1 Personal Reflection ................................................................................................................ 19
Chan Chun Yew - TP057374 ................................................................................................... 19
Stephen Heong – TP057160..................................................................................................... 19
Navitha - TP068096................................................................................................................. 20
Gerard - TP056823 .................................................................................................................. 20
8.0 References ................................................................................................................................. 20

5
1.0 Introduction
Internet connectivity is a requirement for all businesses, including Cyber Petronet Limited
Company (CPLC). We must use every effort to guarantee higher speeds, sufficient data rates,
and complete absence of signal interference from infrastructure. The network plan analyses the
surroundings to determine wireless coverage, data rates, network capacity, roaming capability,
and service quality. Since they are relocating into a new facility with several departments on
each floor, a network consultant has assigned our team to serve as a network consultant.
Business and marketing are located on the ground floor, telecommunications are on the first
floor, network call centre (NCC) is on the second floor, network operation is on the third floor,
and management is on the fourth floor.

We've created a document to analyze and suggest ways that the VLAN concept can be
implemented in the business so that bandwidth is not wasted, the network is not overloaded
with packets, and members of the same VLAN can be spread out throughout the building while
still being able to communicate with one another. Additional suggestions are made in order to
create a network architecture that is effective and meets the objectives of the firm.

2.0 Network Plan/Layout of CPLC


CPLC has moved into a new building because their business is expanding and growing so
fast. In total, the company has five different departments, each on a different floor with their
own switches and equipment. The diagram below depicts the design of each floor and how to
implement VLANs so that the network is not overwhelmed with the required packets and that
members of the same VLAN can be located in different parts of the building. In addition, the
network should be partitioned into different wide areas to avoid bandwidth consumption.
Each floor of the new building has its own different departments and the management
department has its own dedicated room on each floor.

6
2.1 The 4th Floor:

Figure 1: Management Department

This floor is assigned to the Management Department. This floor consists of 3 rooms,
including the rack room. The room at the management department's door has several PCs
which are connected to a switch in the rack. The fourth floor completely assigned to the
management department is given a VLAN 60, so all devices considered to be in this
department can communicate with each other.

7
2.2 The 3rd Floor:

Figure 2: Network Operation Department

The third floor is assigned to two different departments, the Network Operations Department
with VLAN 50 and the Administration Department with VLAN 60. Although each
department is on the same floor, they can only communicate with the relevant department.
All PCs are connected to the switch in the server room, where the concept of VLANs is used,
so that only the intended groups can talk to each other. The diagram below shows how the
network on this floor is designed.

8
2.3 The 2nd Floor:

Figure 3: NCC Department

The second floor is assigned to VLAN 40 for the network call centre department and VLAN
60 for the management department. this floor evenly distributes the space size required by
both departments. Since they are in different VLANs, they cannot communicate with
neighbouring rooms, however, the management department is able to communicate with the
management department on a different floor via the Wireless Router.

9
2.4 The 1st Floor:

Figure 4: Telecommunications Department

The first floor is still assigned to two different departments, the Telecommunications
Department (VLAN 30) and the Administration Department (VLAN 60). The Telecom
Department has three rooms, as this is a pre-defined floor for that department. Even though
the management department is located on each floor, they cannot communicate with
neighbouring devices because they are in different VLANs, however, they can communicate
with other PCs or Laptops in the same VLAN on different floors through the Wireless
Router.

10
2.5 The Ground Floor:

Figure 5: Business & Marketing Department

The Ground Floor is assigned to three different departments, the Business Department for
VLAN 10, the Marketing Department for VLAN 20, and the Management Department for
VLAN 60. Since the Marketing and Business departments have more people, they can only
be assigned to rooms with smaller management departments. Since Marketing, Business and
Manager have different VLANs, they are not able to communicate.

11
3.0 Common Issues in VLAN
Now before we can understand the issues with VLAN , what is VLAN?A virtual local area
network, or VLAN, is a specialized network that is built by combining multiple local area
networks. It makes it possible to unite into a single logical network a collection of devices
that are distributed over many physical networks. As a consequence, a virtual LAN is
produced, which must be managed in the same way as a physical LAN. Virtual Local Area
Network is the complete form that VLAN is abbreviated to when written out.Without the use
of virtual local area networks (VLANs), a broadcast that is sent from a host can easily reach
all of the network devices. Every single device will be responsible for processing broadcast
received frames. It is possible for it to raise the amount of CPU overhead on each device and
lower the network's overall security.

Here are some issues with using VLAN;


1. It is possible for a packet to travel from one VLAN to another.
2. A cyberattack could be triggered by a packet that was maliciously introduced.
3. A virus could be propagated over an entire logical network by a threat that originated
in a single system.
4. In order to maintain control of the workload in large networks, you will need an
additional router.
5. There is a possibility of encountering difficulties with interoperability.
6. It is not possible for one VLAN to forward network traffic to another VLAN.

4.0 Importance of Spanning Tree Algorithm(STA) to solve issues in


VLAN
Loops in networks can be avoided with the help of Spanning Tree Protocol (STP), and
VLANs, or virtual local area networks, can be created with ease with the help of Virtual
Local Area Network. There are some circumstances in which you require loops, but you do
not require redundant links. In case of a network failure, redundant links provide valuable
backups for the network. When the primary link cannot be maintained, the redundant backup
link will become active. Let's imagine there are 2 switches.There is a connection between
Switch 1 and Switch 2 that is unnecessary. Both switches remain in constant communication
with one another and receive copies of all messages delivered between PC1 and PC2.
However, if STP is enabled on both Switch 1 and Switch 2, the network will disable one of

12
the links, and it will logically seem.It is possible to implement STP in VLANs. When STP is
enabled, certain routes, known as backup links, are placed in a blocked state, while the major
links are placed in a forwarding state. When STP was first implemented, it could only be
configured on a single VLAN; however, it is now feasible to enable STP on more than one
VLAN. By default, STP is enabled on all of the switch ports. In switches, we are unable to
disable STP on a port-by-port basis; however, STP may be enabled and disabled on a VLAN-
by-VLAN basis or globally across an entire switch.

Bridges are used to connect the different segment pairs that make up a local area network
(LAN), which is often organized into multiple network segments. Before being delivered to
its final destination, every communication, which is also referred to as a frame, is processed
by the bridge. After determining whether the message is intended for a destination located
inside the same segment as the sender's or for a destination located in another segment, the
bridge will subsequently forward the message in accordance with its determination. A
network switch can also be referred to as a bridge when the term "bridge" is used in the
context of STP.

A bridge examines the destination address and, depending on its knowledge of which
computers are located on which segments, sends the data down the appropriate path through
the appropriate outgoing port. This is done by looking at the destination address. If each
segment contains the same number of computers, network segmentation and bridging can cut
the amount of competition for a network path in half. This is assuming that each segment has
the same number of computers. As a direct consequence of this, the possibility of the network
coming to a standstill has drastically decreased.

When designing a segmented local area network (LAN), it is common practice to include
redundant bridges and routes. This helps ensure that communications are not disrupted in the
event that one of the network links becomes unavailable. Nevertheless, this makes the
network more prone to looping, which necessitates the installation of a system to prevent this
possibility. STP is the solution to this problem.

13
5.0 VLAN Management
VLANs consider more straightforward and work on IT the executives of the organization
framework. On the off chance that VLANs are portioned in light of clients with comparative
organization necessities as well as capabilities, this permits IT to deal with each VLAN and
gatherings of gadgets in a less complex design. For instance, the board can lay out unambiguous
security controls dependent on the clients in each VLAN, and assuming there is an issue with
one VLAN, investigating issues can be settled a lot quicker because of various clients working
on various VLANs. Each VLAN can likewise effectively be named to fit the attributes of the
VLAN (models include: "visitor," "staff," "finance," and so forth.)(Mike Lorenzen, 2018). A
significant positive part of utilizing a VLAN are the security benefits it gives. The detachment
of traffic on an organization forestalls undesirable and unapproved clients and gadgets from
going on a particular organization, lessening dangers and dangers and safeguarding touchy
information. Different security programming and firewalls can be introduced for each VLAN
in an organization, which forestalls compromises of the whole framework in the event that one
VLAN faces a break. Alongside more straightforward organization the board, VLANs
additionally give adaptability to both the organization and clients. VLANs permit geologically
distributed clients and gadgets to associate with different clients without any problem.
Regardless of whether a client moves work areas in an office, for example, the client can remain
in their equivalent organization. Using VLANs likewise put associations in a position to be
ready for future business development; a solid, expandable organization is fundamental for
development(Mike Lorenzen, 2018). Most organizations work fully intent on creating a gain,
and along these lines, most business-related choices rotate somewhat around cost. Each fruitful
association works with the assistance of financial plans, which normally incorporate an IT
financial plan. Utilization of a VLAN designs can assist with setting aside associations cash by
lessening the requirement for network redesigns. All things considered, VLANs use existing
data transmission and uplinks in a more productive way.

One disservice of VLANs is they should be physically designed generally speaking, which is
tedious and asset serious, best case scenario, and mistake inclined to say the least. By utilizing
VLAN arrangement and VLAN the executives programming, notwithstanding, you can
mechanize key tasks. With this product, you don't need to access and sign in to each gadget,
changing the settings individually — a cycle almost certain to bring about botches. All things
considered, human blunder is one of the most widely recognized reasons for design mistakes.
A viable VLAN design program permits you to apply gadget setup changes in mass, saving

14
time and making arrangements more solid and steady. VLAN setup instruments permit you to
see the situation with a scope of gadgets initially. Mass changes are made conceivable by means
of a brought together control center, and the device guarantees every one of the designs are non
conflicting and proper. SolarWinds® Organization Setup Supervisor (NCM) is inconceivably
all around planned. It offers complete VLAN setup and investigating functionalities and flaunts
wide organization design of the executives utilities. This incorporates network robotization,
gadget life cycle the board, network consistency, and weakness appraisal capacities. The
instrument is rich and consolidates a great many high level functionalities with ease of use(Staff
Contributor, 2020).

Key Features:

 Standardizes settings
 Stores an image
 Monitors for tampering
 Restores settings
 Automates onboarding

Thus, SolarWinds can offer you a total arrangement. This is a set-up of checking programs that
are reasonable for a huge organization. On the off chance that you as of now have network
observing programming nearby and you just need to get a design chief, then the SolarWinds

15
offering is as yet a generally excellent framework. The SolarWinds Organization Arrangement
Chief covers each of the needs that you want to keep control of your organization gadgets.

The establishment interaction incorporates a framework check that finds the entirety of your
gadgets and stores previews of their ongoing setups. From that point on, when you need to
adjust the setups of your gadgets, or simply need to refresh one, you roll out those
improvements through the chief instrument. The setup chief can communicate with a
considerable rundown of gadget brands, so you don't need to stress over limiting your hardware
buys to one merchant to keep your design the board basic. All things considered, the device
has a couple of additional elements that work with Cisco gear that can accommodate the results
of different makers.

The Cisco improvements incorporate the coordination of checks with the Cisco Public
Weakness Data set into review clears. This gives you exceptionally strong cautions to setbacks
in security that can be destroyed rapidly with a fix, an update, or a change in the settings of an
organization gadget. On the off chance that you have a Cisco Versatile Security Machine, the
SolarWinds Organization Setup Chief gives you bits of knowledge into the gadget's settings
and helps you oversee and review access control records. The design supervisor will check for
updates and fixes to your ASA's firmware and introduce them consequently. You get
comparative help on the off chance that you have a Cisco Nexus. The Organization Setup
Director is likewise an organization programming updater that will help you update and review
its entrance control records and give you virtual protection setting support for parent/kid
connections(Stephen Cooper, 2022).

16
Pros Cons

Worked for medium to big business size Not intended for home organizations, this is
organizations, with highlights intended to an endeavor apparatus worked for
smooth out investigating and return config framework overseers and organization
settings rapidly professionals

Can consequently find new gadgets on the


organization and give templated wellbeing
reports to quick experiences upon
establishment

Offers design the board, permitting groups to


rapidly reinforcement and reestablish changes
that might have affected execution

Can screen settings for unapproved changes


and explicit groups or supervisors

17
6.0 WAN Switching Technology
VXLAN is an overlay innovation that broadens Layer 2 VLANS across a Layer 3 IP Network.
It makes a Layer 2 Tunnel likewise called a VXLAN Section between 2 Virtual Tunnel
Endpoints otherwise called VTEP. VXLAN is an innovation which permits overlaying a Layer
2 (L2) network over a Layer 3 (L3) underlay with utilization of any IP directing convention. It
involves Macintosh in-UDP Encapsulation. VXLAN takes care of three fundamental issues:

 16M VNIs (broadcast domains) versus the 4094 presented by customary VLANs.
 Permits L2 to be expanded anyplace in an IP organization.
 Optimized flooding.

Why VXLAN?

 VLAN Versatility - VXLAN expands the L2 Fragment ID field to 24-bits, which


possibly permits up to 16 million novel L2 portions over a similar organization.
 L2 Fragment Versatility over L3 Limit - VXLAN epitomizes a L2 outline in an IP-UDP
header, which permits L2 contagiousness across switch limits.
 Influences multicast in the vehicle network to reproduce flooding conduct for broadcast,
obscure unicast, and multicast in the L2 portion.
 Influence Equal Cost Multipathing (ECMP) to accomplish ideal way utilization over
the vehicle organization.

Get Layer 2 traffic from a source, for example, a VM, in an Ethernet broadcast space,
exemplifying it inside a VXLAN edge and sending it to the objective
VTEP. Get the VXLAN outline, stripping the exemplification to uncover the epitomized
Ethernet edge, and sending the casing toward the objective remembered for the embodied
Ethernet outline.
VXLAN burrow which conveys the exemplified information is called an overlay organization.
The IP actual organization that switches and courses the passages that make up the overlay is
known as the underlay network.(This is your customary organization, generally your current
vlans and trunks.)(Samuel O, 2021)

18
7.0 Conclusion
To sum up, VLAN makes network design management and administration simpler. The
traffic will be reduced, as will the security arrangements, by using VLAN. Additionally,
VLAN gives logical power to end-stations that are physically dispersed across the network,
so when clients move to another physical region to use the same capacity, the end stations
don't need to be reconfigured further. As part of this assignment, we created a paper to
evaluate, explain, and make recommendations for how a Virtual LAN (VLAN) could be
deployed to prevent bandwidth consumption on the CPLC network as their business grows.
However, departmental communication is limited to those users. Each section now includes a
recommendation for the technology that should be used. Including a floorplan for the
previous structure to fully comprehend the network architecture, a floorplan was created for
both the old and the new buildings that shows every device in the network. In order to
complete this task and recommend a complete network architecture for the CPLC network,
numerous resources and courses were used.

7.1 Personal Reflection


Chan Chun Yew - TP057374
In this assignment, I learned a lot about VLANs. First of all, this is the reason why we need
VLANs. After learning about the problems CyberPetronet Limited (CPLC) was facing, the
company was growing in size and needed to put different departments on different floors. By
doing so, the normal LAN method would cost the company a lot of money as they would
need to buy a lot of equipment such as additional routers and switches. Because if you use
LAN theory, each department needs to use its own specific switch, because they need to be
located on similar networks and use the same ports. There can't be any mix. So if 3
departments are sitting on one department, there will be about 3 different switches. Even the
wiring would be more expensive because you would need dedicated wiring. From this
perspective, VLANs solve all the problems while saving a lot of money because all
employees can be connected to a single switch and then can be logically separated according
to their specific department.

Stephen Heong – TP057160


In this assignment, I have learned the importance of the amount of theoretical knowledge of
the Switching Technology subject needed to even pursue such an objective in the real world. a
lot of planning has to be done just to complete a configuration that helps the company benefit.

19
I have also learned the importance of communication when it comes to projects, we always
ought to communicate with other team members to diligently acquire the best possible
answers.

Navitha - TP068096
I contributed at different points in the assignment as CPLC hired our team to come up with a
solution to overcome their business growth hurdle and move to a new building. In this
proposal, I have made a document to analyze and recommend how to implement the VLAN
concept in a CPLC company. Each department passing through the CPLC has its own VLAN,
and the users of the department are located in different places.

Gerard - TP056823
In this assignment I have learned that for networking there is more to it than just
understanding the theory, it is important to also understand the practical nature of Switching
Technologies and its uses in the real world. One of the most important things we have learned
is the use of Inter Vlan routing , a very important piece of networking and also the uses of the
Spanning Tree Protocol. In conclusion, this module has taught me the importance of all these
technologies and how we as network engineers have a responsibility in learning them and
how to incorporate all of these technologies into one when we start our lives in the
workplace. For this I would extend my thanks to Mr Yoges in imparting this knowledge onto
us.

8.0 References
1. Mike Lorenzen, M.C.P. (2021) The importance of using Vlans to Segment Network
Traffic, LinkedIn. Available at: https://www.linkedin.com/pulse/importance-using-
vlans-segment-network-traffic-mike (Accessed: November 11, 2022)
2. Herbst, J. (2017) Vlans: 5 types and benefits, Summit 360. Available at:
https://www.summit360.com/2017/08/30/vlans-types-benefits/ (Accessed: November
11, 2022).
3. Cooper, S. (2022) 10 best network config tools and software, Comparitech. Available
at: https://www.comparitech.com/net-admin/10-best-network-config-tools-and-
software/ (Accessed: November 11, 2022).
4. O, S. (2021) Using VXLAN to extend L2 networks across layer 3 links, Expert
Network Consultant. Available at: https://www.expertnetworkconsultant.com/expert-
approach-in-successfully-networking-devices/using-vxlan-to-extend-l2-networks-
across-layer-3-links/ (Accessed: November 11, 2022).
5. Cisco Networking Academy’s Introduction to VLANs > Objectives. (n.d.). Cisco
Press. https://www.ciscopress.com/articles/article.asp?p=2181837
6. Jaques, R. (2003, November 24). What WAN technology is right for your business?
https://www.theregister.com/2003/11/24/what_wan_technology_is_right/

20
7. Understand and configure STP on Catalyst Switches (2022) Cisco. Cisco. Available
at: https://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-
protocol/5234-5.html (Accessed: November 12, 2022).
8. Williams, L. (2022) STP – spanning tree protocol explained, Guru99. Available at:
https://www.guru99.com/stp-spanning-tree-protocol-examples.html (Accessed:
November 12, 2022).
9. Froehlich, A. et al. (2019) VLAN troubleshooting commands, Network Computing.
Available at: https://www.networkcomputing.com/network-security/vlan-
troubleshooting-commands (Accessed: November 12, 2022).
10. Take online courses. earn college credit. Research Schools, Degrees & Careers (no
date) Study.com | Take Online Courses. Earn College Credit. Research Schools,
Degrees & Careers. Available at: https://study.com/academy/lesson/vlan-
troubleshooting-procedures-commands.html (Accessed: November 12, 2022).

21

You might also like