Computer Network Assignment 3 Mid Term - 1711873364743
Computer Network Assignment 3 Mid Term - 1711873364743
1|Page
Contents
Executive Summary ........................................................................................................................................ 3
Objectives ........................................................................................................................................................ 4
1. Introduction ............................................................................................................................................. 5
2. Network Requirements Analysis............................................................................................................ 5
3. Network Design ....................................................................................................................................... 6
3.1 Benefits of Three-Tier Architecture ............................................................................................... 7
4. Security Measures ................................................................................................................................... 8
5. Network Implementation: ...................................................................................................................... 9
5.1. Router.................................................................................................................................................... 9
5.2. Multi-Layer Switch .............................................................................................................................. 9
5.3. Layer two switch ................................................................................................................................ 10
5.4 Clients................................................................................................................................................... 10
5.5 CAT 6 Cable ........................................................................................................................................ 10
6.Testing and Verification ............................................................................................................................ 20
1. Ping ..................................................................................................................................................... 21
2. Tracert ................................................................................................................................................ 21
3. VLAN .................................................................................................................................................. 21
4. Trunk .................................................................................................................................................. 21
7. Scalability Considerations .................................................................................................................... 30
8. Conclusion .............................................................................................................................................. 30
2|Page
Executive Summary
3|Page
selecting the right backbone technology and access can be a successful factor in
building network topology for the Texas IT company.
I have used this architecture because the chief benefit of three-tier architecture is
its logical and physical separation. Each and every tier can run on a separate
operating system and server platform. If one connection is lost there will be no
error occur and the system will run smoothly. It provides high security because
the presentation tier and data tier cannot communicate directly so the data cannot
flow.
Objectives
4|Page
1. Introduction
Before going into the specifics of the network design, it is important to conduct a
comprehensive needs assessment and analysis of any Company's requirements.
So, I have collects some of the information regarding sale, marketing and finance
department of Texas IT Company in my project. This involves understanding the
distinct communication, collaboration, and internet access needs of each
department. Additionally, considerations must be made for the logical separation
of departments to maintain confidentiality and security while enabling VLAN
communication for interdepartmental. For 100 users in different department i.e.
Sales, marketing, finance. I have separate five computers for sales department it
will be easy in billing, four computers for marketing department and three
computers for finance department, for smooth communication. For security
purpose I have logically separated with the help of VLAN.
5|Page
3. Network Design
6|Page
The proposed network architecture for Texas IT Company's new office space
involves the creation of a segmented infrastructure to logically separate the Sales,
Marketing, and Finance departments. There are a lot of topology among them I
have selected Three-Tier Architecture. This segmentation will be achieved
through the implementation of Virtual Local Area Networks (VLANs) ensuring
that each department operates within its designated virtual network while still
allowing secure communication between them. I have choose this architecture
because it logically separate and maintained between Presentation Tier,
Application Tier, and Database Tier. I have taken one router and two multi-layers
switch, three switch of layer two and six computers for may topology. Router
manage overall entire network traffic.
7|Page
4. Security Measures
8|Page
5. Network Implementation:
5.1. Router
9|Page
5.3. Layer two switch
10 | P a g e
Cat 6 cable, also known as Category 6 cable, is a type of
twisted pair cable used in Ethernet networks. It is an
upgraded version of Cat 5e cable and offers higher
performance and faster data transmission speeds. Cat 6
cable is designed to support Gigabit Ethernet and is
backward compatible with previous Ethernet standards. Cat
6 cables consist of four twisted pairs of copper wires, with
each pair individually shielded to minimize crosstalk and
interference. The cables are typically terminated with RJ-45 connectors, which
are commonly used for Ethernet connections.
6. Configuration Details
11 | P a g e
khem_SW6#show vlan brief
Creating VLAN
switch 6 VLAN Name Status Ports
---- -------------------------------- --------- -------------------------------
Switch(config)#vlan 10 1 default active Fa0/5, Fa0/6, Fa0/7, Fa0/8
Fa0/9, Fa0/10, Fa0/11, Fa0/12
Switch(config-vlan)#name sales
Fa0/13, Fa0/14, Fa0/15, Fa0/16
Switch(config-vlan)#exit Fa0/17, Fa0/18, Fa0/19, Fa0/20
Fa0/21, Fa0/22, Fa0/23, Fa0/24
Gig0/1, Gig0/2
Switch(config)#interface range fastEthernet 10 sales active Fa0/3, Fa0/4
0/3-4 1002 fddi-default active
1003 token-ring-default active
Switch(config-if-range)#switchport mode 1004 fddinet-default active
access 1005 trnet-default active
khem_SW6#
Switch(config-if-range)#exit
Switch(config)#hostname khem_SW6
khem_SW6(config)#
12 | P a g e
Creating VLAN khem_SW7#show vlan brief
khem_SW7(config-if-range)#switchport
mode access
khem_SW7(config-if-range)#switchport
access vlan 20
khem_SW7(config-if-range)#exit
khem_SW7(config)#
13 | P a g e
khem_SW8#show vlan brief
switch 8
khem_SW8#
14 | P a g e
Creating VLAN on multilayer switch 6 Switch#show vlan brief
VLAN Name Status Ports
15 | P a g e
Trunking multilayer switch Switch#show interfaces trunk
Fa0/2 1-1005
Fa0/3 1-1005
Fa0/4 1-1005
Fa0/2 1,10,20,30
Fa0/3 1,10,20,30
Fa0/4 1,10,20,30
Fa0/2 1,10,20
Fa0/3 10,20
Fa0/4 10,20
16 | P a g e
IP Address on multilayer switch ip routing
Switch(config)#ip routing
Switch(config)#interface vlan 10 Switch(config)#interface fastEthernet 0/1
Switch(config-if)#ip address 192.168.10.1 Switch(config-if)#no switchport
255.255.255.0
Switch(config-if)#ip address 10.10.10.2
Switch(config)#interface vlan 20 255.255.255.0
Switch(config-if)#ip address 192.168.20.1 Switch(config-if)#exit
255.255.255.0
Switch(config)#ip routing
Switch(config)#interface vlan 30
17 | P a g e
Creating VLAN multilayer switch 7 khem_SW(multilayer)#show interfaces trunk
khem_SW(multilayer)(config-vlan)#exit
Fa0/4 1,10,20,30
Fa0/3 1,10,20,30
khem_SW(multilayer)(config-if-
range)#switchport mode dynamic desirable
18 | P a g e
IP Address IP routing
khem_SW(multilayer)(config)#ip routing
khem_SW(multilayer)(config)#interfac khem_SW(multilayer)(config)#interface
e vlan 10 fastEthernet 0/1
khem_SW(multilayer)(config-if)#ip khem_SW(multilayer)(config-if)#no
address 192.168.10.5 255.255.255.0 switchport
khem_SW(multilayer)(config-if)#ip khem_SW(multilayer)(config-if)#no
address 192.168.20.5 255.255.255.0 shutdown
khem_SW(multilayer)(config-if)#exit
khem_SW(multilayer)(config)#interfac
e vlan 30 khem_SW(multilayer)(config)#end
khem_SW(multilayer)(config-if)#ip
address 192.168.30.5 255.255.255.0
19 | P a g e
ROUTER
khem_router(config-if)#no shutdown
khem_router(config-if)#exit
khem_router(config-if)#no shutdown
khem_router(config-if)#exit
20 | P a g e
6.Testing and Verification
1. Ping
A ping (Packet Internet Groper) is a basic internet program which allows
us to test and verify if a particular destination IP address exists and can
accept requests in computer network administration. Ping command is used
to test and verify the communication between the computers. I have use
ping command in my topology to test and verify the communication
between VALN and computers.
2. Tracert
Tracert helps us to identifies the route in which packet takes between our
computer and to the destination computers specified in the command.
Troubleshooting a large network where several paths can lead to the same
point or where many intermediate components (routers or bridges) are
involved. I have used this command in my topology to know the data flow
or to check the data packet from where it is flow.
3. VLAN
A virtual local area network (VLAN) is a virtualized connection which
connects multiple devices and network nodes from different LANs into
one logical network. I have crate VLAN in my topology to separate my
department i.e. sales, marketing and finance.
4. Trunk
A trunk is a communication line such as a wire or optical line which is
designed to carry multiple signals simultaneously. It helps to provides
network access between two points. I have created in my topology for
smooth communication between switch to switch and switch to router.
21 | P a g e
22 | P a g e
23 | P a g e
24 | P a g e
Ping form PC 1 VLAN 10 To pc 0 VLAN 20
25 | P a g e
Ping form PC 1 VLAN 10 To pc 5 VLAN 30
26 | P a g e
ping form PC 2 VLAN 10 To pc 6 VLAN 30
27 | P a g e
sTracert form VLAN 30 PC 6 to VLAN 10 PC 1
28 | P a g e
Tracert
29 | P a g e
7. Scalability Considerations
As Texas IT Company continues to expand, scalability is a critical factor in the
network design. The proposed infrastructure will be designed with scalability in
mind, allowing for seamless integration of additional users, devices, and services
as the company grows. This scalability will be achieved through the use of
modular networking equipment, flexible addressing schemes, and provisioning for
future bandwidth requirements.
8. Conclusion
In conclusion, the proposed network infrastructure design for Texas IT Company's
new office space aims to provide a secure, scalable, and efficient platform to
support the company's communication, collaboration, and internet access needs.
By implementing advanced security measures, scalable architecture, and cutting-
edge technology solutions, Texas IT Company will be well-positioned to adapt to
future challenges and continue its trajectory of growth and success.
30 | P a g e