Beruflich Dokumente
Kultur Dokumente
Join deepl to
Pro
DeepL
to editPro
thistodocument.
edit this document.
Visitmore
For www.DeepL.com/Pro
information, pleaseforvisit
more.
www.DeepL.com/Pro.
[Student's name]
The report was prepared for the use of LAN technology to analyze and improve its role in
"dead ducks". The project will provide a detailed description of the network and its assessment
techniques and safety issues caused by templates troubleshooting and network devices such as
switches, routers, voice gateways, firewalls and other devices that must be overcome. These
computers are connected to the LAN by Ethernet, Fast Ethernet and Gigabit Ethernet or by other
means. The purpose of this course - to get an idea of the design and implementation of the
network, the network device and display the configuration of network security. Security is one of
the main characteristics of a network, and data security is very important since the time of the
dead duck. In this course you will learn to filter the router, packets and troubleshoot the network,
test network performance, etc. Configure This course will help you get information about the IP
objective 1
LAN Technology: -
LAN: Network - business network of various local interconnected networks inside buildings and
generally located in the same area or the same network, in other words, they are called LAN. The
Dead Duck publisher usually has the entire campus network, and it also has a physical cable.
campus networks are generally Ethernet, 802.11 wireless LAN, Fast Ethernet Rapid, Rapid Ether
Ethernet - LAN technology based on the 802.3 of the Institute of Electrical and
Electronics Engineers (IEEE), which provides a bandwidth of 10 Mbps between the end users or
PC; in other cases, LAN technology is connected to another computer via Ethernet and ensures
The Ethernet switch can prevent the possibility of a crash as the stations of the
transmission cable does not have to listen to each other. Instead, the station may be in transmit
mode full duplex and low at the same time. Full duplex improves system performance: 10 Mbps
half duplex
Part of a duplex LAN technology where many widgets work in half duplex mode, as a
hub or repeater. These hubs are actually multiplex repeaters; this is how the idea of the topology
of transport.
10Base2 and 10Base5, restore the same electrical signal to the periphery of the first wire,
the second for each door. However, the effects can occur in any case, always applying the
principles of CSMA / CD. The Ethernet card working and an additional CPU are essential to
understand the synchronization problems and requirements of Ethernet in full duplex. After
- Place the frame on a pair of receptors that are sent to the network.
- send a frame hub on the internal bus to all other network adapters to an electrical signal.
- The signal from each receiver pair is repeated for all the other devices of the network hub.
Full duplex:
The full duplex service is included in eliminating the probability of failure. Consider using
Ethernet between pairs of networks, not the network card to connect to a central point. Full
duplex is another type design using switches. Once the switch is connected to a single device, it
can not guarantee there will be no effect, allowing full duplex mode.
As it is impossible to obtain the effects on the network cards in full duplex mode, the
feedback devices are blocked. You can send and receive the circuit simultaneously. That reduces
the Ethernet synchronization and creates favorable conditions when there are no collisions,
unlike half-duplex 10BaseT, no time for packet transmission and 10 Mbps in both directions, in
industry faster based on existing Ethernet measurements, called Fast Ethernet Quick. Ethernet
operates at 100 Mbps and is characterized by IEEE 802.3u. Ethernet wiring plans work CSMA /
CD and all conditional level operations are compatible with Fast Ethernet. The result is the same
layer media access control data transmission channel (MAC) connected to the other physical
layer.
4 100BASIS-T4
3 100BASIS-TX
1 10BASE-T
The standard Gigabit Ethernet IEEE 802.3 and IEEE 802.3z, while the Gigabit Ethernet
supports 1000 Mbps / s or 1 Gbps per port network switch and physical layer is adapted to
increase the data rate while the Gigabit Ethernet is connected to the access layer. . Switching to
the switches of the distribution layer, such as the Gigabit Ethernet switch in the block, the base
The Gigabit Ethernet 1000BASE-X is used to display the rankings in the media, and 10
Gigabit 10GBASE-X is used to display the rankings. The quality is characterized by a large
number of LDCs and the type of windows and limits division. All optical fiber PMD can be used
as a physical LAN, or with the exception of 10GBASE-LX4, often purely physical. Remember
LAN equipment
This segment includes the network or equipment classified according to the OSI model i.
- Centers
- Gateways
- Go to
- Crossbars
- Switches Layer 3
Repeater
Repeaters are the basic block in systems that combine individual blocks. Repeaters receive
datagrams or suitable edge packets and provide all the interfaces in the envelope adjacent to the
receiving port. Repeaters operating in the physical layer of the OSI model. Repeaters detect
datagrams / packets or chorus configurations; they do not have control screens and multipurpose
rooms or emergency. Repeaters are considered conventional because the repeater is not known
for its high level of conventions such as IP, IPX (Internet Protocol Packet Exchange), etc.
HUB
The hub is the basic unit of the LAN technology, and level 1, the physical layer of the
OSI unit - a first level and they understand something, but the main difference lies in the fact that
gateways
Bridges - a device for storage and transportation. They record the entire frame or datagram and
check the cyclic redundancy check (CRC) for shipment. When bridges have detected a CRC
error in a box or a datagram, they remove the box or datagram. The bridges are transparent to the
protocol; they do not know the level protocols such as IP, IPX, AppleTalk, and others. Bridges
are designed to cope with all the unknowns floods and those of broadcast or multicast traffic.
Gateways embody STP (STP = Inclusion Tree Protocol) to create a circular topology system.
Bridges, for example, to meet and communicate the MAC address of the interface and require
The switch is a single platform multi-port and the switch port is a proprietary Ethernet
LAN and PBX fragment is separated from other manufacturers, but also fully compatible with
the MAC configuration; in all cases, the switch will not add such a sharp if you do not know the
destination area.
Device or switch smarter for the local network - this is more specific integrated circuits
designed to reduce downtime, usually standard extensions, or the display area in a room or a
local network. Switches - movement in the forest. In this mode, the switch can continue to
operate in "pass-through"; the switches are not attracted, so a full board or a datagram came to
support them, and start the frame to return when the destination offers a MAC address. The fact
of working in shift mode increases the likelihood that the shells are created by system failures,
because it increases before cutting all edges and check the trap. Given these problems,
Transmission
The program consists of edges or specific datagrams, packets that are connected to all of
FF-FF-FF-FF. I - TV Program MAC address is the most amazing number allowed in the project
transmission to direct operations to more than one of the selected locations, rather than
The application of the guiding layer preceded 01-00-5. Despite the remaining digits,
which are the result of a number of consultation requests, given different costs. However, the
prefix 01-00-5E other ilhidnyh second level configurations, for example, MAC address STP 01-
00-0c-CC-CC-CD. Ethernet systems are usually treated with a transmission at several levels, as
shown in the figure. A number of high-level agreements such as IGMP (Internet Group Message
Protocol - Internet protocol multicast messages) can be used by individual industrial change and
Job change : -
The switches conduct dialogues at several levels on the 3rd and 4th layers. The catalysts
of group switches layer 3 contains activity feed, IP addresses. On the 4th layer, activity streams
are reserved based on source and destination addresses, regardless of the source and destination
ports. All exchanges are performed in devices that ensure equivalent performance levels 3 and 4.
You can configure the logic diagram using devices such as a router or switch. There are basically
- Bus
- Star
- Make the call.
- Mask
- Wood
- Hybrids
Bus
Each node is connected to a cable and a signal is reproduced from each node in both directions.
Since only one cable installation is profitable. There are two cable types: linear cables and
distribution cables, with two terminals in the next general transmission medium.
Star
Star - a star of this topology, connected to all other nodes that function as servers, and the rest -
as customers. They have two types of stars, and placed stretched in the following locations,
In this topology, the nodes are connected in a circle in which the data is transferred from
one node to another until a node to reach the same direction, although each node operates as a
server, and repeats the character the only disadvantage is that each node means that when the
mesh
In this topology, each node is connected directly to another. There are two types of fully
connected networks and the connected network is fully connected, all nodes are connected
directly to a fully connected network, which is virtually impossible for a large network, because
the cost is very high and a complex network very difficult to maintain, and then some of its
nodes are connected to more nodes than those connected to the other, it is relatively expensive
The wood, there is only one structure in this topology with a root node and intermediate
nodes, and finally branched knots, leaves called the longest nodes, which at least three must be in
the hierarchy. the tree, otherwise, can be physically formed as root. The nodes and other nodes
are interconnected like leaves. In this error detection is simple because it is easy to manage nodes
in a hierarchical structure, and this connection allows units from point to point throughout.
hybrid
This mixture of two or more of the above elements to create a hybrid model, but both
connected networks must have a different topography. The common combinations are the star
1.2 How do you define quality of service (QoS) and bandwidth management? Evaluate and
give examples of why you think the quality of service (QoS) and bandwidth management
Quality of Service (QoS), and QoS is defined as the best use of priority traffic. This is done by
low priority through traffic, and motivation of the quality of service is to provide a consistent and
reliable access to the network and critical data to network users and critical data. The
traditional data network. The quality of service (QoS) controls the bandwidth and network
words: QoS, detection of traffic flows in the network. Most modern networks use QoS for the
same reasons. Customers are looking for cheaper alternatives to increase network capacity for a
variety of services they support. However, the lack of capacity is not the only reason for the
quality of service. Some requests are delayed and require special handling on the network.
- Classification
- Select
- Retirement Planning
Classification
The classification distinguishes a frame from another, so that the packet is then sent by a
registered switch port as unlimited, so that the value of the COS is shifted each frame received
on this port.
As planning
When programming data or programming entries with the agency after managing the edge of the
input port and the receiving ports are designed to trust. The information mainly distributes an
appropriate shell where trust is not developed, and frontal approach avoids specifically limited
1.3 Discuss how to improve the security, availability and performance related to safety locale7
Explain how a hierarchical network designs availability, security, scalability and performance
the routing infrastructure required to connect to the site and internet connectivity inter-site, and
the infrastructure needed to connect to the site and inter-site Internet connectivity
Another way according to plan the system, which allows authors to create a legal system
by characterizing and using gadgets layers. In this case, the system is the security, availability,
performance, productivity, information, flexibility and effective control. The diagram promotes
progressive changes in the system design may include privacy components, circuits which
develop twice the system because each exchange component, the cost and complexity of system
reconfiguration is necessary. . A subset of the overall system. The advanced architecture of the
present system in many variations. Persons with reduced cross-section on a layer or segment, for
The system components are a small separation problem. System administrators can easily
frustration.
Accelerated agreements are currently being developed for serial topography. For the
preparation of the effects of the arrangement and use of the data transfer rate required by the
coherent different topography regarding such bodies as the first open lanes agreements (Spoa).
The hierarchical structure of the network makes it easy to add routes. EIGRP and other routing
protocols are very important for the summary route. Merging road reduces the overhead of
routing protocols in the network and reduces the processing of routing protocols in routers.
Access level: -
The entry level or level of access provides access to some parts of the area in the system,
in other words, the level of entry of the low cost carrier for wearing thick switching link rising
scalable with maximum sustainable levels on different lines. up and personalized access.
bandwidth, such as participation in traffic filtering and the traditional distribution of VLAN and
QoS and Ethernet (PoE) and VoIP VLAN. LAN sections constitute the initial layer for the
Distribution / redistribution of routes in the middle of the access layer and the devices for feeding
the core layer at this level: High Level 3 packet processing, network and security policies,
working through the records, the access protocol or packages of routes, QoS, scalable and
reliable components to quickly connect to the city center and the access levels.
The base layer
Level Center / Gates combines all the gadgets the level concerned. The core layer is also called
the spine, a level 2 or 3 very high and no unnecessary or redundant control strips, as well as food
A plan that meets both current and future needs of the local and global network.
TASK 2
2.1 Develop infrastructure to meet the requirements of the above scenario, including the
control network and all the devices (eg, switches, routers, cables, etc.) that meet there.
Critical assessment of the adequacy of the network components in the design in terms of security,
security
Dead Duck has a security policy document is executed and the rules apply to a specific
environment. After testing a comprehensive security policy, Orga Oatarc found that she had
created a roadmap to help implement the right tools, security mechanisms and instruments to
meet their specific needs. Dead Duck publishing company quickly finds shortcomings in the
security of his image / early in the process to identify critical resources and related policies and
link this information to inadequate safety measures. This documentation should be changed
gradually as and evolve IT and physical environments to be sent and received as part of a normal
security. The core network provides the ideal speed for intelligent security solutions and high
level. The network center includes Secure Network Adaptive Security Appliance (ASA). Points
of integrated services (ISB). A Cisco Catalyst integrated security talks. This is a highly
intelligent network security device that includes a variety of security features that are the basis of
network security.
scalability
environments. The basic idea is reliable: Business opportunities: the document ct Our foundation
takes large amounts limitless, and we are making improvements and extensions without lightning
and without downtime, in other words, to enable performance overall system. with enhanced
support and additional resources to improve. For example, we use copper cable, and we must
Availability
The availability is displayed as a percentage of the time. How many days, hours and minutes of
electricity infrastructure and supply DC power for a given period? Because the average number
of baseball players when they can get to the base, the amount of constant impact of current
sources available when the current management of the infrastructure can not be ensured
otherwise. Baseball - is the mean value. Leave aside all the stars. Assuming that there are no
breaks, it means that the DC working all hours, but 12 8 760 per year.
TASK 3
3.1 Draw a complete design network, including servers, connected devices, workstations,
Using the portable track Cisco. We will develop your business, and gradually we will explain
this step we designed, "we develop", whether the new thing in the middle or center of London.
First, we can router connected to a manual for beginners to change the situation, to adjust the
First, we will connect to the access switch to the lift and the switch of the switch, which is
connected to every end user and every server and critical apparatus by a switch.
• 2 Set the hostname of the switch and the router of all network devices.
• We create three new VLAN (financial accounts, library service and support customer
• We have set up a SIP on the switch so that it can be delayed for a network without loops and
without cycles.
• All access switches must be in mode of delivery so that all traffic is routed through the
• All ports are access switches (connected to the PC) must be configured as an access
Recommendations for infrastructure, what would you recommend
3.2 Please justify a list of IP addresses, subnet IDs, broadcast IDs for each department, the
The university will use the private IP address 192.168.0.0/16 on the local network, and
we will use the same IP group to access a broad network of external sites or
Host 192.168.0.1
1255
MASK SUBNET
2SS.255.2S4.0
Host 192.168.2.1
End hot
192.168.P.2SS
MASK SUBNET
2SS.2S5.2S4.0
Host 192.168.4.1
End hot
192.168.P.2SS
MASK SUBNET
255.25S.254.0
Host 192.168.6.1
7255
MASK SUBNET
255.25S.254.0
Host 192.168.8.1
9255
Mask subnet
255.255.254.0
192.168.10.0
Host 192.168.10.1
The term "Variable Length Subnet Mask" (VLSM) refers to a class C network, a network for a
variety of subnet masks. When designing the VLSM is executed If you understand the previous
section, you already understand the concept behind the VLSM. The planning, implementation
and deployment of networks with VLSM require a full and working knowledge of the signatures.
for example
We have now established a new headquarters in central London with the subnet mask
192.168.10.0/23.
192.168.10.0/23
Host 192168.101
Address: 192.168.10.0
Finance Department
Address: 192.168.11.0
placeholder: 0.0.0.63
=>
192.168.11.62 Hosts: 62
Customer service :
IP addresses of servers:
=>
The finance department needs 14 system IP addresses and IP address of the printer. So
we've created here 26 sets of IP addresses, each block contains 64 addresses, it uses the IP
address n of the
broadcast
10 2 63
11 2 Hfi3
12 2 63
PC 34 192.168.11. 25525525519 192.168.11.
44 2 63
50 2 11fi3
broadcast
1.72 92 127
1.73 92 127
1.74 92 127
The service of the library is installed with 200 work stations, we therefore needed a title / 24 IP
broadcast
broadcast
TASK 4
Have set up a basic network at the University of London, the plan describes the upgrade
process from beginning to end, so we have data on the performance of the traffic of the campus
network, use bandwidth, lost mistakes and errors necessary for operating the apparatus. We
know that no changes are made after installation. We have daily, weekly or older, and quarterly
performance, the use of network bandwidth, and we monitor traffic analysis and other tools, such
as the creation of tools tickets to verify that the bandwidth or high traffic or depleted charge are
used to the maximum. At certain times of the day, we also check the other control tool when we
introduce in control tools or when we detect an error in the interaction. Port JIA distribution
switch connected to the server; they are included in the monitoring tool that helps us to
determine who is using the load. The network devices that we install during the installation use
all the features of network technology. We develop security policies that we apply to the segment
.lan network, be it a Mac or a connection port, they are working or not ... use all the technology
features network. We develop security policies that we apply to the segment .lan network, both
of a Mac or a connection port, they work ... or not to use all the features of network technology.
- Ensure the implementation of the Directive by linking and verifying the threshold gap control
tools.
4.2 There are many on the market network performance monitoring tools, simply select one of
The school of the University of London used seven instruments to monitor the solar wind. The
ICCM special art tools to play an important role in network availability and network devices, and
these tools help us to classify connection errors and disconnect devices. Operation MRTG
communication devices. In case of network failure, a notice must be sent. This allows us to act in
- We can configure network devices that are used to study the windscreen monitoring tools.
- The generation of logs from any device also sends an informal notification
4.3 One of the computers used in the library is being replaced, do you plan to install a new
step by step, to connect to the network and verify connectivity to effectively and efficiently?
In this network scenario, we can adjust the HO to the computer in DHCP: This is the IP
address of the DHCP VLAN (... Customer Service Accounting Library), then the IP address of
the gel through rt DCP or DNS. In the following case, the DHCP has configured the system to
dynamically generate the IP address. Once the system has assigned the IP address. We also need
to verify that the bridge is configured as port security and MAC address connected to the
previous system. Therefore, we will successively implement a port, remove the old MAC address
and add a new MAC address, but check your system the disappearance of the cross signal. The
system is now able to connect to the network and access the intranet and Internet applications.
TASK 5
5.1 The use of the network simulator designed to simulate the network, including the
following
The installation and configuration of devices and services in the local network and the
I install a new accommodation center in the center of London, so I have the router and I connect
to the central switch, as described in detail below. We need to configure the router name with the
following command
We insert a new segment IAN so that .ve names first configure the switch, and we can get
Vlan30 interface
!!
Vlan40 interface
!!
Vlan50 interface
!!
Conclusion
So we have a great network for automation and coordination of actions that take place in the
Door2Door intelligence service developed, based on local and regional offices. The design of our
network works well because we tested the performance and connectivity with Cisco Network
Tracker 6.0 and new LAN and WAN technologies. The network is designed to be supported
once a week, which is possible on any system using special software. According to our findings,
the network is sufficiently structured and efficient to carry out normal activities of courier
services and to improve subsequent performance by making small changes and taking prescribed