Sie sind auf Seite 1von 29

Subscribe

Join deepl to
Pro
DeepL
to editPro
thistodocument.
edit this document.

Visitmore
For www.DeepL.com/Pro
information, pleaseforvisit
more.
www.DeepL.com/Pro.

Homing: design performance and network security

Performance of design and network security

[Student's name]

[Name of the institution]


Introduction

The report was prepared for the use of LAN technology to analyze and improve its role in

"dead ducks". The project will provide a detailed description of the network and its assessment

techniques and safety issues caused by templates troubleshooting and network devices such as

switches, routers, voice gateways, firewalls and other devices that must be overcome. These

computers are connected to the LAN by Ethernet, Fast Ethernet and Gigabit Ethernet or by other

means. The purpose of this course - to get an idea of the design and implementation of the

network, the network device and display the configuration of network security. Security is one of

the main characteristics of a network, and data security is very important since the time of the

dead duck. In this course you will learn to filter the router, packets and troubleshoot the network,

test network performance, etc. Configure This course will help you get information about the IP

address / control group, VLAN, STP, VTP or a network monitoring tool.

IT infrastructure, which is topped by the low quality of design decisions

objective 1

1.1 Evaluation of different LAN technologies available on the market.

technologies related to the scenario above.

LAN Technology: -

LAN: Network - business network of various local interconnected networks inside buildings and

generally located in the same area or the same network, in other words, they are called LAN. The

Dead Duck publisher usually has the entire campus network, and it also has a physical cable.

campus networks are generally Ethernet, 802.11 wireless LAN, Fast Ethernet Rapid, Rapid Ether

Channel and Gigabit.


Ethernet.

Institute of Electrical and Electronics Engineers (IEEE) Ethernet (802.3)

Ethernet - LAN technology based on the 802.3 of the Institute of Electrical and

Electronics Engineers (IEEE), which provides a bandwidth of 10 Mbps between the end users or

PC; in other cases, LAN technology is connected to another computer via Ethernet and ensures

consistent performance. 10 Mbps between each end user.

The Ethernet switch can prevent the possibility of a crash as the stations of the

transmission cable does not have to listen to each other. Instead, the station may be in transmit

mode full duplex and low at the same time. Full duplex improves system performance: 10 Mbps

net throughput on all collectors or total capacity of 20 Mbps on all ports.

half duplex

Part of a duplex LAN technology where many widgets work in half duplex mode, as a

hub or repeater. These hubs are actually multiplex repeaters; this is how the idea of the topology

of transport.

10Base2 and 10Base5, restore the same electrical signal to the periphery of the first wire,

the second for each door. However, the effects can occur in any case, always applying the

principles of CSMA / CD. The Ethernet card working and an additional CPU are essential to
understand the synchronization problems and requirements of Ethernet in full duplex. After

Duplex 10BaseT figure presents the medium-term plan.

Find next for full duplex center:

- Sending staff to the network interface card (NIC)

- Place the frame on a pair of receptors that are sent to the network.

- The frame in the middle.

- send a frame hub on the internal bus to all other network adapters to an electrical signal.

- The signal from each receiver pair is repeated for all the other devices of the network hub.

Full duplex:

The full duplex service is included in eliminating the probability of failure. Consider using

Ethernet between pairs of networks, not the network card to connect to a central point. Full

duplex is another type design using switches. Once the switch is connected to a single device, it

can not guarantee there will be no effect, allowing full duplex mode.

As it is impossible to obtain the effects on the network cards in full duplex mode, the

feedback devices are blocked. You can send and receive the circuit simultaneously. That reduces

the Ethernet synchronization and creates favorable conditions when there are no collisions,

unlike half-duplex 10BaseT, no time for packet transmission and 10 Mbps in both directions, in

which the width available bandwidth is doubled.


1.1 Capacity expansion

Fast Ethernet IEEE 802.3u

Fast Ethernet - is another innovation aimed at increasing data growth rates in an

Ethernet environment, or in other words, the addition of an Ethernet systems management

industry faster based on existing Ethernet measurements, called Fast Ethernet Quick. Ethernet

operates at 100 Mbps and is characterized by IEEE 802.3u. Ethernet wiring plans work CSMA /

CD and all conditional level operations are compatible with Fast Ethernet. The result is the same

layer media access control data transmission channel (MAC) connected to the other physical

layer.

Priority Ethernet mode

7 100BASE-T2 (full duplex)

6 100BASE-TX (full duplex)

5 100BASE-T 2 (half duplex)

4 100BASIS-T4

3 100BASIS-TX

2 10BASE-T (full duplex)

1 10BASE-T

Gigabit Ethernet IEEE 802.3z or IEEE 802.3ab:

The standard Gigabit Ethernet IEEE 802.3 and IEEE 802.3z, while the Gigabit Ethernet

supports 1000 Mbps / s or 1 Gbps per port network switch and physical layer is adapted to

increase the data rate while the Gigabit Ethernet is connected to the access layer. . Switching to
the switches of the distribution layer, such as the Gigabit Ethernet switch in the block, the base

layer and the server unit.

IEEE 802.3ae 10 Gigabit Ethernet:

The Gigabit Ethernet 1000BASE-X is used to display the rankings in the media, and 10

Gigabit 10GBASE-X is used to display the rankings. The quality is characterized by a large

number of LDCs and the type of windows and limits division. All optical fiber PMD can be used

as a physical LAN, or with the exception of 10GBASE-LX4, often purely physical. Remember

that the PMD wavelength are more expensive than others.

LAN equipment

This segment includes the network or equipment classified according to the OSI model i.

- the lower segment of computer networks, and

- Repeat the process

- Centers

- Gateways

- Go to

- Crossbars

- Switches Layer 3

Repeater

Repeaters are the basic block in systems that combine individual blocks. Repeaters receive

datagrams or suitable edge packets and provide all the interfaces in the envelope adjacent to the

receiving port. Repeaters operating in the physical layer of the OSI model. Repeaters detect
datagrams / packets or chorus configurations; they do not have control screens and multipurpose

rooms or emergency. Repeaters are considered conventional because the repeater is not known

for its high level of conventions such as IP, IPX (Internet Protocol Packet Exchange), etc.

Figure 5: Diagram of repeaters

HUB

The hub is the basic unit of the LAN technology, and level 1, the physical layer of the

OSI unit - a first level and they understand something, but the main difference lies in the fact that

most of hub ports basic relay ....

gateways

Bridges - a device for storage and transportation. They record the entire frame or datagram and

check the cyclic redundancy check (CRC) for shipment. When bridges have detected a CRC

error in a box or a datagram, they remove the box or datagram. The bridges are transparent to the

protocol; they do not know the level protocols such as IP, IPX, AppleTalk, and others. Bridges

are designed to cope with all the unknowns floods and those of broadcast or multicast traffic.

Gateways embody STP (STP = Inclusion Tree Protocol) to create a circular topology system.

Bridges, for example, to meet and communicate the MAC address of the interface and require

matrices. Extensions and then select the root exploit STP.


Go to

The switch is a single platform multi-port and the switch port is a proprietary Ethernet

LAN and PBX fragment is separated from other manufacturers, but also fully compatible with

the MAC configuration; in all cases, the switch will not add such a sharp if you do not know the

destination area.

Device or switch smarter for the local network - this is more specific integrated circuits

designed to reduce downtime, usually standard extensions, or the display area in a room or a

local network. Switches - movement in the forest. In this mode, the switch can continue to

operate in "pass-through"; the switches are not attracted, so a full board or a datagram came to

support them, and start the frame to return when the destination offers a MAC address. The fact

of working in shift mode increases the likelihood that the shells are created by system failures,

because it increases before cutting all edges and check the trap. Given these problems,

Transmission

The program consists of edges or specific datagrams, packets that are connected to all of

the Ethernet system devices. Transmission of MAC address FF-FF-FF-FF-FF-FF-FF-FF-FF-FF-

FF-FF-FF-FF. I - TV Program MAC address is the most amazing number allowed in the project

with a MAC address of 48 bits. Parallel 1-48 bits.


multicast -

Multicast - a specific transmission. High Level Agreements used in a complex

transmission to direct operations to more than one of the selected locations, rather than

broadcasting the program at all.

The application of the guiding layer preceded 01-00-5. Despite the remaining digits,

which are the result of a number of consultation requests, given different costs. However, the

prefix 01-00-5E other ilhidnyh second level configurations, for example, MAC address STP 01-

00-0c-CC-CC-CD. Ethernet systems are usually treated with a transmission at several levels, as

shown in the figure. A number of high-level agreements such as IGMP (Internet Group Message

Protocol - Internet protocol multicast messages) can be used by individual industrial change and

the addition of unique multicultural ports.

Job change : -

The switches conduct dialogues at several levels on the 3rd and 4th layers. The catalysts

of group switches layer 3 contains activity feed, IP addresses. On the 4th layer, activity streams

are reserved based on source and destination addresses, regardless of the source and destination

ports. All exchanges are performed in devices that ensure equivalent performance levels 3 and 4.

Topology of local networks -

You can configure the logic diagram using devices such as a router or switch. There are basically

six types of topography:

- Bus

- Star
- Make the call.

- Mask

- Wood

- Hybrids

Bus

Each node is connected to a cable and a signal is reproduced from each node in both directions.

Since only one cable installation is profitable. There are two cable types: linear cables and

distribution cables, with two terminals in the next general transmission medium.

Star

Star - a star of this topology, connected to all other nodes that function as servers, and the rest -

as customers. They have two types of stars, and placed stretched in the following locations,

together in one place the afternoon without center attached or higher.


cooee

In this topology, the nodes are connected in a circle in which the data is transferred from

one node to another until a node to reach the same direction, although each node operates as a

server, and repeats the character the only disadvantage is that each node means that when the

unit is abandoned, the entire network falls.

mesh

In this topology, each node is connected directly to another. There are two types of fully

connected networks and the connected network is fully connected, all nodes are connected

directly to a fully connected network, which is virtually impossible for a large network, because

the cost is very high and a complex network very difficult to maintain, and then some of its

nodes are connected to more nodes than those connected to the other, it is relatively expensive

and can take advantage of redundancy, which is always completely clean.


Wood

The wood, there is only one structure in this topology with a root node and intermediate

nodes, and finally branched knots, leaves called the longest nodes, which at least three must be in

the hierarchy. the tree, otherwise, can be physically formed as root. The nodes and other nodes

are interconnected like leaves. In this error detection is simple because it is easy to manage nodes

in a hierarchical structure, and this connection allows units from point to point throughout.

hybrid

This mixture of two or more of the above elements to create a hybrid model, but both

connected networks must have a different topography. The common combinations are the star

topology, topology, bus and star.

1.2 How do you define quality of service (QoS) and bandwidth management? Evaluate and

give examples of why you think the quality of service (QoS) and bandwidth management

(bandwidth) are important, from analysis to implementation.

Quality of Service Quality of service: -

Quality of Service (QoS), and QoS is defined as the best use of priority traffic. This is done by

low priority through traffic, and motivation of the quality of service is to provide a consistent and

reliable access to the network and critical data to network users and critical data. The

implementation of QoS is required for converged networks combining IP telephony with

traditional data network. The quality of service (QoS) controls the bandwidth and network

capacity and monitor certain common conditions


QoS destinations are reliable and affordable source of applications and network services. In other

words: QoS, detection of traffic flows in the network. Most modern networks use QoS for the

same reasons. Customers are looking for cheaper alternatives to increase network capacity for a

variety of services they support. However, the lack of capacity is not the only reason for the

quality of service. Some requests are delayed and require special handling on the network.

The discussion in this section is based on the DiffServ model.

The operational service quality model includes five phases:

- Classification

- Planning for contributions

- Marking and observation.

- Select

- Retirement Planning

Classification

The classification distinguishes a frame from another, so that the packet is then sent by a

registered switch port as unlimited, so that the value of the COS is shifted each frame received

on this port.

As planning

When programming data or programming entries with the agency after managing the edge of the

input port and the receiving ports are designed to trust. The information mainly distributes an
appropriate shell where trust is not developed, and frontal approach avoids specifically limited

lines and sends the machine to exchange.

1.3 Discuss how to improve the security, availability and performance related to safety locale7

Explain how a hierarchical network designs availability, security, scalability and performance

the routing infrastructure required to connect to the site and internet connectivity inter-site, and

the infrastructure needed to connect to the site and inter-site Internet connectivity

A hierarchical network design -

Another way according to plan the system, which allows authors to create a legal system

by characterizing and using gadgets layers. In this case, the system is the security, availability,

performance, productivity, information, flexibility and effective control. The diagram promotes

progressive changes in the system design may include privacy components, circuits which

develop twice the system because each exchange component, the cost and complexity of system

reconfiguration is necessary. . A subset of the overall system. The advanced architecture of the

present system in many variations. Persons with reduced cross-section on a layer or segment, for

example the center of the base or the

The system components are a small separation problem. System administrators can easily

understand the concentration of traffic in a system, which identifies the concentration of

frustration.
Accelerated agreements are currently being developed for serial topography. For the

preparation of the effects of the arrangement and use of the data transfer rate required by the

coherent different topography regarding such bodies as the first open lanes agreements (Spoa).

The hierarchical structure of the network makes it easy to add routes. EIGRP and other routing

protocols are very important for the summary route. Merging road reduces the overhead of

routing protocols in the network and reduces the processing of routing protocols in routers.

Access level: -

The entry level or level of access provides access to some parts of the area in the system,

in other words, the level of entry of the low cost carrier for wearing thick switching link rising

scalable with maximum sustainable levels on different lines. up and personalized access.

bandwidth, such as participation in traffic filtering and the traditional distribution of VLAN and

QoS and Ethernet (PoE) and VoIP VLAN. LAN sections constitute the initial layer for the

exchange and transmission of data shared at the soil surface. ....

The distribution layer

Distribution / redistribution of routes in the middle of the access layer and the devices for feeding

the core layer at this level: High Level 3 packet processing, network and security policies,

working through the records, the access protocol or packages of routes, QoS, scalable and

reliable components to quickly connect to the city center and the access levels.
The base layer

Level Center / Gates combines all the gadgets the level concerned. The core layer is also called

the spine, a level 2 or 3 very high and no unnecessary or redundant control strips, as well as food

for redundancy and high availability.

A plan that meets both current and future needs of the local and global network.

TASK 2

2.1 Develop infrastructure to meet the requirements of the above scenario, including the

control network and all the devices (eg, switches, routers, cables, etc.) that meet there.

Critical assessment of the adequacy of the network components in the design in terms of security,

scalability and availability.

security

Dead Duck has a security policy document is executed and the rules apply to a specific

environment. After testing a comprehensive security policy, Orga Oatarc found that she had

created a roadmap to help implement the right tools, security mechanisms and instruments to

meet their specific needs. Dead Duck publishing company quickly finds shortcomings in the

security of his image / early in the process to identify critical resources and related policies and

link this information to inadequate safety measures. This documentation should be changed

gradually as and evolve IT and physical environments to be sent and received as part of a normal

security. The core network provides the ideal speed for intelligent security solutions and high
level. The network center includes Secure Network Adaptive Security Appliance (ASA). Points

of integrated services (ISB). A Cisco Catalyst integrated security talks. This is a highly

intelligent network security device that includes a variety of security features that are the basis of

network security.

scalability

The concept of scalability required in technology and in our projects or commercial

environments. The basic idea is reliable: Business opportunities: the document ct Our foundation

takes large amounts limitless, and we are making improvements and extensions without lightning

and without downtime, in other words, to enable performance overall system. with enhanced

support and additional resources to improve. For example, we use copper cable, and we must

now go to the UTP cable.

Availability

The availability is displayed as a percentage of the time. How many days, hours and minutes of

electricity infrastructure and supply DC power for a given period? Because the average number

of baseball players when they can get to the base, the amount of constant impact of current

sources available when the current management of the infrastructure can not be ensured

otherwise. Baseball - is the mean value. Leave aside all the stars. Assuming that there are no

breaks, it means that the DC working all hours, but 12 8 760 per year.
TASK 3

3.1 Draw a complete design network, including servers, connected devices, workstations,

peripherals, etc. for the scenario above.

Using the portable track Cisco. We will develop your business, and gradually we will explain

this step we designed, "we develop", whether the new thing in the middle or center of London.

First, we can router connected to a manual for beginners to change the situation, to adjust the

wave, adjust and make all IAN technology.

First, we will connect to the access switch to the lift and the switch of the switch, which is

connected to every end user and every server and critical apparatus by a switch.

• 2 Set the hostname of the switch and the router of all network devices.

• We create three new VLAN (financial accounts, library service and support customer

VLAN) and VLAN servers for the switch.

• Then we set up a VIP area (Virtual Delivery Protocol) on the switch.

• We have set up a SIP on the switch so that it can be delayed for a network without loops and

without cycles.

• All access switches must be in mode of delivery so that all traffic is routed through the

inventory of the VLAN.

• All ports are access switches (connected to the PC) must be configured as an access
Recommendations for infrastructure, what would you recommend

3.2 Please justify a list of IP addresses, subnet IDs, broadcast IDs for each department, the

choice of methods selected (VLSM or others).

The university will use the private IP address 192.168.0.0/16 on the local network, and

we will use the same IP group to access a broad network of external sites or

Subnet Allocation website bit

192.168.0.0 Edinburgh 192.168.0.0/23

Host 192.168.0.1

End Hot 192 168

1255

MASK SUBNET

2SS.255.2S4.0

192.168.2.0 Birmingham 192.168.2.0/23

Host 192.168.2.1

End hot

192.168.P.2SS

MASK SUBNET

2SS.2S5.2S4.0

192.168.4.0 Liverpool 192.168.4.0/23

Host 192.168.4.1
End hot

192.168.P.2SS

MASK SUBNET

255.25S.254.0

192.168.6.0 Manchester 192.168.6.0/23

Host 192.168.6.1

End Hot 192 168

7255

MASK SUBNET

255.25S.254.0

192.168.8.0 Glasgow 192.168.8.0/23

Host 192.168.8.1

End Hot 192 168

9255

Mask subnet

255.255.254.0

192.168.10.0

Host 192.168.10.1

IP address and VLSM

The term "Variable Length Subnet Mask" (VLSM) refers to a class C network, a network for a

variety of subnet masks. When designing the VLSM is executed If you understand the previous

section, you already understand the concept behind the VLSM. The planning, implementation

and deployment of networks with VLSM require a full and working knowledge of the signatures.
for example

We have now established a new headquarters in central London with the subnet mask

192.168.10.0/23.

192.168.10.0/23

Host 192168.101

End hot 192.168.11.2S5

MASK SUBNET 2S52S52S4.0

Library of the Faculty

Address: 192.168.10.0

Subnet Mask: 255.255.255.0 = 24

Placeholder: 0.0.0.255 =>

Network: 192.168.10.0/24 Translation: Basic 192.168.10.255 Host: 192.168.10.1 final Host:

192.168.10.254 Hosts: 254

Finance Department

Address: 192.168.11.0

Subnet Mask: 2S5.2SS.25S.192 = 26

placeholder: 0.0.0.63

=>

Network: 192.168.11.0/26 Translation: 192.168.11.63 initial Host: 192.168.11.1 final Host:

192.168.11.62 Hosts: 62
Customer service :

Address: 192.168.11.64 Subnet Mask: 2S5.255.255.192 = 26 Placeholder: 0.0.0.63 =>

Network: Broadcasting 192.168.11.64/26: 192.168.11.127 base Visit: 192.168.11.65 final drive:

192.168.11.126 Host / Network 62

IP addresses of servers:

Address: 192.168.11.128 Subnet Mask: 255.255.255.192 = 26 Placeholder: 0.0.0.63

=>

Network: 192.168.11.128/26 Translation: 192.168.11.191 Basic Orientation: 192.168.11.129

final drive: 192.168.11.190 Host: 62

IP addresses of the Finance Department

The finance department needs 14 system IP addresses and IP address of the printer. So

we've created here 26 sets of IP addresses, each block contains 64 addresses, it uses the IP

address of the gateway, and the other - for the transfer.

Workplace The IP Subnet mask Identificatio

address n of the

broadcast

PCI 192.168.11. 25525525519 192.168.11.

10 2 63

PC 2 192.168.11. 25525525519 192,168,

11 2 Hfi3

PC3 192.168.11. 25525525519 192.168.11.

12 2 63
PC 34 192.168.11. 25525525519 192.168.11.

44 2 63

Printer 192.168.11. 25525525519 192,168

50 2 11fi3

The after-sales service has only five workplaces. 192.168.11.64/26

Workplace The IP Subnet Identificati

address mask on of the

broadcast

PCI 192.168.1 2S5.2S5.2S 192.168.11.

1.70 S.192 127

PC 2 192.168.1 2S5.255.2S 192.168.11.

1.71 5.192 127

PC3 192.168.1 2552552551 192.168.11.

1.72 92 127

PC4 192.168.1 2552552551 192.168.11.

1.73 92 127

PCS 192.168.1 2552552551 192.168.11.

1.74 92 127

The service of the library is installed with 200 work stations, we therefore needed a title / 24 IP

addresses. 192 168 100/74


Workshop The IP Subnet Identificatio

address mask n of the

broadcast

PCI 192.168.1 255.255.2 192.168.10.

0.10 55.0 25!

PC 2 192.168.1 255.255.2 192.168.10.

0.11 55.0 255

PC 3 192.168.1 255.255.2 192.168.10.

0.12 55.0 255

PC4 192.168.1 255.255.2 192.168.10.

0.13 55.0 255

PCS 192.168.1 255.255.2 192.168.10.

0.14 55.0 255

PK10 192.168.1 255.2SS.2 192.168.10.

0.19 S5.0 255

PC 200 192.168.1 255.255.2 192.168.10.

0.209 55.0 255

The printer 192.168.1 255.255.2 192.168.10.

1 0.220 55.0 255

Printer 2 192.16810 255.255.2 192.168.10.

.221 55.0 255


Server IP Address: 192.168.11.128/26 Carn Server. A web server and a domain controller

Tsrvor IP The IP Subnet Identificatio

address mask n of the

broadcast

web Service 192.168.11. 2SS.255.2S 192.168.11.

140 5.192 191

File Server 192.168.10. 2SS.255.25 192.168.11.

141 5.192 191

TASK 4

4.1 Establishment of a performance start to the publication of network "dead letter"

mentioned above and evaluation WLAN planned.

Have set up a basic network at the University of London, the plan describes the upgrade

process from beginning to end, so we have data on the performance of the traffic of the campus

network, use bandwidth, lost mistakes and errors necessary for operating the apparatus. We

know that no changes are made after installation. We have daily, weekly or older, and quarterly

performance, the use of network bandwidth, and we monitor traffic analysis and other tools, such

as the creation of tools tickets to verify that the bandwidth or high traffic or depleted charge are

used to the maximum. At certain times of the day, we also check the other control tool when we

introduce in control tools or when we detect an error in the interaction. Port JIA distribution

switch connected to the server; they are included in the monitoring tool that helps us to

determine who is using the load. The network devices that we install during the installation use
all the features of network technology. We develop security policies that we apply to the segment

.lan network, be it a Mac or a connection port, they are working or not ... use all the technology

features network. We develop security policies that we apply to the segment .lan network, both

of a Mac or a connection port, they work ... or not to use all the features of network technology.

We develop security policies that we apply to the segment .lan network.

All the basic parameters are listed below.

- Ensure the implementation of the Directive by linking and verifying the threshold gap control

tools.

- The broadband portals monitoring tool generates a warning.

4.2 There are many on the market network performance monitoring tools, simply select one of

them and to report on monitoring the performance of your network.

The school of the University of London used seven instruments to monitor the solar wind. The

ICCM special art tools to play an important role in network availability and network devices, and

these tools help us to classify connection errors and disconnect devices. Operation MRTG

communication devices. In case of network failure, a notice must be sent. This allows us to act in

advance to be able to act quickly. The main advantages of monitoring tools.

- We can configure network devices that are used to study the windscreen monitoring tools.

- We can check the status of servers and network devices.

- Automatically send alerts in case of failure of connections and devices.

- Provides real-time monitoring and historical data.

- The generation of logs from any device also sends an informal notification
4.3 One of the computers used in the library is being replaced, do you plan to install a new

step by step, to connect to the network and verify connectivity to effectively and efficiently?

In this network scenario, we can adjust the HO to the computer in DHCP: This is the IP

address of the DHCP VLAN (... Customer Service Accounting Library), then the IP address of

the gel through rt DCP or DNS. In the following case, the DHCP has configured the system to

dynamically generate the IP address. Once the system has assigned the IP address. We also need

to verify that the bridge is configured as port security and MAC address connected to the

previous system. Therefore, we will successively implement a port, remove the old MAC address

and add a new MAC address, but check your system the disappearance of the cross signal. The

system is now able to connect to the network and access the intranet and Internet applications.

TASK 5

5.1 The use of the network simulator designed to simulate the network, including the

following

The installation and configuration of devices and services in the local network and the

introduction of configuration mechanisms and specialized security in the LAN.


First, I found the router and I connected with him; we need to configure the router when

we use the command.

I install a new accommodation center in the center of London, so I have the router and I connect

to the central switch, as described in detail below. We need to configure the router name with the

following command

We insert a new segment IAN so that .ve names first configure the switch, and we can get

a 4 VIAN the power switch, which are listed below

Vlan30 interface

IP address 255.255.255.128 192.168.10.1

jp, access group 103

!!
Vlan40 interface

Jp 192.16p.10.129 address 255.255.255.128

Introduction of an Access Group to IP 104

!!

Vlan50 interface

IP address 192.168.1.129 255,255,255,255,255,248

!!

Conclusion

So we have a great network for automation and coordination of actions that take place in the

Door2Door intelligence service developed, based on local and regional offices. The design of our

network works well because we tested the performance and connectivity with Cisco Network

Tracker 6.0 and new LAN and WAN technologies. The network is designed to be supported

once a week, which is possible on any system using special software. According to our findings,

the network is sufficiently structured and efficient to carry out normal activities of courier

services and to improve subsequent performance by making small changes and taking prescribed

measures to maintain the network.

Das könnte Ihnen auch gefallen