You are on page 1of 58

ASSIGNMENT FRONTSHEET

Qualification BTEC Level 5 HND Diploma in Computing

Unit number and title Unit 2: Networking

Submission date 21/04/2021 Date Received 1st submission

Re-submission Date Date Received 2nd submission

Student Name LE DUC HUNG Student ID BHAF200026

Class FBIT17101-NETWORKING Assessor name LE VAN THUAN

Student declaration

I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.

Student’s signature

Grading grid
P1 P2 P3 P4 P5 P6 P7 P8 M1 M2 M3 M4 D1 D2 D3

1
 Summative Feedback:  Resubmission Feedback:

Grade: Assessor Signature: Date:


Signature & Date:

2
Table of Contents

Introduce:................................................................................................................................................................................ 5
I. Discuss the benefits and constraints of different network types and standards........................................................5
1. Discuss the benefits and constraints of network types................................................................................................5
2. Discuss various network standards.............................................................................................................................. 9
II. Explain the impact of network topology, communication, and bandwidth requirements.......................................14
1. The impact of network topology................................................................................................................................ 14
2. The impact of communication and bandwidth requirements....................................................................................19
III. Discuss the operating principles of networking devices and server types..............................................................19
1. The operating principles of networking devices.........................................................................................................19
2. The operating principles of server types.................................................................................................................... 24
IV. Discuss the inter-dependence of workstation hardware with relevant networking software.................................28
V. Design a networked system to meet a given specification..................................................................................... 29
1. Request...................................................................................................................................................................... 29
2. Design plan................................................................................................................................................................. 29
VI. Test and evaluate the design to meet the requirements and analyze user feedback.............................................33
1. Check and evaluate the design for requirements......................................................................................................33
2. Equipment cost.......................................................................................................................................................... 34
VII. Implement a networked system based on a prepared design..............................................................................38
3
1. Basic configuration..................................................................................................................................................... 38
2. On Switches................................................................................................................................................................ 40
3. On R-BTEC-01 and R-BTEC-02..................................................................................................................................... 43
4. ACL............................................................................................................................................................................. 46
5. HSRP (Hot Standby Routing Protocol)................................................................................................................... 47
VIII. Document and analyse test results against expected results............................................................................... 48
1. VLAN........................................................................................................................................................................... 48
2. DHCP.......................................................................................................................................................................... 48
3. Static routing and NAT............................................................................................................................................... 49
4. ACL............................................................................................................................................................................. 50
5. HSRP (Hot Standby Routing Protocol)................................................................................................................... 51
IX. Conclusion........................................................................................................................................................... 54
X. References............................................................................................................................................................ 54

Introduce:

- In this report, I will cover network principles and their protocols, and explain network devices and operations. In
particular, I also played the role of a network administrator in an international company to set up a network system
for a school.

4
I. Discuss the benefits and constraints of different network types and standards.

1. Discuss the benefits and constraints of network types.


- A computer network consists of a group of computers that are linked together. A network allows computers to
connect and interconnect with different computers via multiple means and allows computers to share resources,
data, and applications with each other.
- There are many types of network configurations such as: LAN, CAN, MAN, WAN, PAN. But the two most popular
types today are:
+ Local Area Network (LAN)
+ Wide Area Network (WAN)

a. Local Area Network (LAN)

- A local area network (LAN) is a computer network that is grouped together in a relatively small area such as a group
of buildings, a room, or a private house, where the devices are interconnected.

5
Picture: Local Area Network model.

- Advantages

Share resources: Devices can share resources with each other. Data can be shared across the network.

Internet sharing: In the LAN system, an internet connection can be used between computers. The internet cable is
attached to a server and is distributed among the attached computers.

Share software program: Software programs can be shared on LAN, everyone can use them as a single licensed
software and it also makes software upgrade easier.

6
Easy, fast, and time-saving communication: The computers in the LAN can exchange information and data quickly. It
saves time in the working process. Users on the same network can access the same data on the server.

Computer identification: Each computer in the LAN is provided with a MAC address. And the MAC address is used
to identify computers on the LAN while sending and receiving messages and data together.

- Disadvantages

The local network has distance limits. It can only be performed in a building or an office and cannot be extended to
a wider area.

In a LAN system, if a computer on the server is down, the other computers will also have problems.

Setting up a LAN costs a lot of money. Devices such as hubs, switches, routers ... are very expensive. b.

Wide Area Network (WAN)

- A wide area network (also known as WAN) is a type of telecommunications network that can connect devices from
multiple locations and around the globe. The WAN is the largest and most expansive computer network to date. A
WAN can help devices from around the world communicate and share information with each other.

7
Picture: Wide area network model.

- Advantages

8
Covering a large geographical area: Wan covers a much wider geographical area than LAN, which makes it easy for
devices in different cities or countries to connect with each other.

Share software and resources: Like LAN, devices in the WAN can also share software applications and other
resources such as hard drives, RAM with other users on the internet.

Centralized data: In the WAN network, all data can be located at the head office and synchronized with all other
branches. So, users don't need to buy email, files, and backup servers.

- Disadvantages

Security is not good: Because WAN has many technologies combined together, the ability to create gaps in security
is very large.

Need firewall and anti-virus software: on computers accessing the internet, it is necessary to turn on firewalls or
install anti-virus software because data transmitted over the internet is easy to access and attack by hackers.

High setup costs: To set up a LAN requires a very large number of devices.

Troubleshooting: Most of the WAn wires go by sea, so when there is a problem such as a broken wire,
troubleshooting is very difficult.

In addition to the two types of LANs and WANs mentioned above, there are also other types of networks that are
used quite a lot such as:

+ Personal Area Network (PAN)

+ Wireless Local Area Network (WLAN)


9
+ Campus Area Network (CAN)

+ Metropolitan Area Network (MAN)

+ Storage-Area Network (SAN)

+ Virtual Private Network (VPN)

2. Discuss various network standards

The computers in the network may use separate software, hardware, and protocols, but for two or more
comuters to communicate with each other, they need to comply with certain communication standards.

a. OSI Model (Open System interconnection)

- The Open System Connection Model (OSI) is a set of protocols that


define and standardize data communications, used to describe the
functions of a network. The OSI protocols are defined by the
International Organization for Standardization (ISO).
- In the OSI reference model, the communication between a computer
system is divided into seven different layers of abstraction:

10
-

- Picture: The seven layers of OSI model.

Application layer: Where applications can access network services.

Presentation layer: Ensures that data is in a usable format and is where data encryption occurs.

Session layer: Maintains connections and is responsible for controlling ports and sessions.

Transport layer: Transmits data using transmission protocols including TCP and UDP.

Network layer: Decides which physical path the data will take.

Datalink layer: Defines the format of data on the network.

11
Physical layer: Transmits raw bit stream over the physical medium.

- Advantages

The OSI model is a common model. So it is seen as a standard model in computer networks.

Each layer in the OSI model is distinguished according to services, interfaces and protocols.

Has flexibility to adapt to many protocols.

It supports connection orientation when we need reliability and less connection services when we need faster data
transmission over the internet.

Administration and maintenance is very simple and easy because all services are differentiated in different layers
and always follow the division technique.

When one class changes, it does not affect the other classes much.

Since it is divided into many layers, it is safer and more adaptable.

- Disadvantages

Difficulty in practical implementation because the OSI model does not offer appropriate solutions of networks and
it has the theory and does not meet the actual needs.

The OSI model is a very complex model leading to its limited practical implementation.

The cost when implementing the OSI model is quite expensive.

In different layers, there is service overlap.

The layers in the OSI model have interdependencies and cannot work in parallel.
12
b. TCP/IP model

- Transmission Control Protocol / Internet Protocol (TCP / IP) is a set of


network protocols that allow two or more computers to communicate
on a network such as the internet. TCP / IP was developed by the
Department of Defense for the purpose of connecting a number of
different networks from different providers. - Its model is divided into
four distinct layers and used together:

Picture: The four layers of TCP/IP model.

Application layer: provides applications with standardized data exchange.

Transport layer: responsible for maintaining end-to-end communications throughout the network.

Internet layer: handling packets and connecting independent networks to transport packets across network
boundaries.

The Network Access layer: it consists of protocols that only operate on one link - the network element that
connects the nodes or servers in the network.

13
- Advantages

It is a standard model that can be implemented effectively in practical networking problems.

It allows computers to communicate between heterogeneous networks.

Each device can be identified over the network by assigning an IP address to each machine via TCP / IP model.

Can be used by any person or organization because the TCP / IP model is an open protocol suite and does not
belong to any particular institute.

- Disadvantages

It is not suitable to describe new technologies because it does not clearly separate the concepts of services,
interfaces, and protocols.

Poor optimization: because it is not optimized for small networks like LAN and PAN.

The cost is quite expensive.

Difficult to set up and maintain.

II. Explain the impact of network topology, communication, and bandwidth requirements(P2)

1. The impact of network topology.


Network topology is the way in which the elements of the different networks are arranged to be related to each
other.
There are two approaches to network topology: physical and logical.
14
a. Physical Topology

Physical Topology: It refers to the actual connections like wires, cables, ... of how the revolution is arranged.

In physical topology, there are 6 different types of physical topologies: BUS topology, RING topology, STAR
topology, MESH topology, TREE topology, HYBRID topology.

However, Common networks have four types of structures: Star Topology, Ring Topology, Mesh Topology and Bus
Topology.

BUS Topology:

Bus topology: network devices are oriented along a cable in a single direction from one end to the other. Data on
the network also moves along the cable's route.

Picture: BUS topology.

15
- Advantages

Easy layout.

Cost savings for small networks.

Can add multiple nodes to the network easily.

- Disadvantages

If the main cable fails, the entire network will be damaged.

It takes time and cost to repair.

Only suitable for small networks because there is too much bandwidth.

RING Topology:

Ring topology: Nodes are arranged in a circle. Data can be transmitted in both directions. Each device is connected
to two devices on its sides.

16
Picture: RING topology

- Advantages

Low installation cost.

Identifying problems or misconfiguration on the network is relatively easy.

Low risk of packet collision when transmitting data.

17
-

Disadvantages

Easy to fail without proper network management.

Adding more devices can cause delays in the overall communication of the network.

STAR Topology:

Star topology: Each device in the network is set up so that every node in the network is directly connected to a
central device called a hub, and this device acts as a server, managing the transmission data in the network.

Picture: Star topology

18
-

Advantages

Easy to install.

Easy to edit, add or remove without connecting the entire network.

Less installation cost because this structure uses relatively few cables to connect the entire network.

- Disadvantages

If the Hub device malfunctions, the devices cannot work.

The speed of the network is limited with Hub configurations and parameters.

MESH Topology:

Mesh topology: Each device is connected to the other devices on the network by a point-to-point connection. The
network can be either full or partial.

Picture: Mesh topology

19
-

Advantages Reliable

and stable.

Easy to detect errors.

- Disadvantages

It costs a lot of money to install cables.

A large number of I / O ports are required when connecting with other devices.

b. Logical Topology

- Logical Topology: It talks about how revolution is established, including which nodes connect to each other and
how they are connected and how data is transmitted over the network.
2. The impact of communication and bandwidth requirements.
- Bandwidth is a key concept in many telecommunications applications. In a network, bandwidth refers to the
maximum number of bits per second that we can send or receive a connection. Or it is also known as data transfer
rate. High bandwidth, expensive networks can transfer data much faster than low bandwidth networks. The
number and types of cables used or the type of network card and modem can affect bandwidth.

III. Discuss the operating principles of networking devices and server types(P3)

1. The operating principles of networking devices.


- In any network, devices that provide connectivity and functionality are required. In a computer network, every
network device plays an important role based on its own function and a device is operated for different purposes in
different parts.

20
-

21
a. Hubs.

Picture: Hub device.

A hub is a type of network device in a computer network, used to communicate with different network servers and also
to transmit data.

Hubs are used in networks that use twisted pair cables to connect devices. It acts as a hub to provide the path for
electrical signals to travel.

A hub is a simple device that directs data packets to all devices connected to the center, regardless of whether the data
plan is for that device or not.

Hubs come in many different shapes and sizes.

Network Hubs is classified into two categories: Active Hub and Passive Hub.

+ Active Hub: These hubs have their own power supply and are used for cleaning, boosting and transmitting signals over
the network.

+ Passive Hub: These hubs transmit signals over the network without improving and cleaning them.

22
b. Bridges.

Picture: Bridge device

By controlling the data flow between two networks, Bridges can divide larger networks into smaller components.

Bridge uses hardware MAC (Media Access Control) to transmit frames.

Bridges can choose to forward the data or block the passage of data by considering the MAC address.

In addition, bridges can be used to connect two physical LANs into a larger logical LAN.

23
c. Router.

Picture: Router device.

Routers are used to route traffic from one network to another. It helps to transmit packets to their destination by
plotting paths across a sea of network devices that are interconnected using different network topologies.

The formatted routes can act as a packet-filtering firewall and use an access control list (ALC).

In addition, it can also be used to translate from a LAN frame to a WAN frame, dividing the local network into two or
more subnets, and the routes themselves can be configured as static or dynamic.

24
d. Switches.

Picture: Switch device.

Like hubs, the switch is the connection point of the Ethernet network and the devices connect to the switch via twisted
pair cabling, one cable for each device.

It also works at the layer of the LAN, but it is smarter than a hub.

In a switch, it processes data by forwards the data it receives to all ports on the device, and a switch only forwards
that data to the port connected to the target device, by learning the address. The MAC address of the device is
attached to it, then matches the destination MAC address in the data it receives.

e. Repeater.
25
Picture: Repeater device.

The repeater has the function of regenerating or amplifying the signal before the signal is weak otherwise it will fail and
it works at the physical layer of the OSI model.

f. Gateways.

Gateway operates at the session and transport layers in the OSI model. Ports perform all the functions of routers
and ports that connect two or more different networks, where each network has its own domain name service,
topology, protocols, and policies. For example, routing gateways translate data from one network protocol to
another.

2. The operating principles of server types.

a. Web Server.

A web server is a computer where web pages run. It stores, processes, and delivers web pages to its users. Its main job
is to display web page content and it is required to display web page content to the user's browser.

26
Every website on the Internet has a unique IP address. This ip address is used for communication between different
servers on the Internet.

Currently on the market there are many servers such as Apache, IIS of Microsoft ...

b. Application Server.

The software that integrates the creation of web applications and the server environment to run them is known as
application server. It sits between the main web-based server tier and the back-end tier of the database server.

It is designed to install, operate, and host applications for end users and also facilitate the storage and distribution of
applications.

Application Server is used for many purposes such as: running web applications, hosting a hypervisor to manage
virtual machines, delivering software updates, processing data sent from another server ... c. Printer Server.

Devices that allow you to share your printer with multiple computers are called print servers. When enabled, it allows
the printer to connect to your local network instead of a single computer.

There are two types of printer servers: stand-alone print servers and proper print servers. In addition, some routers can
also act as print servers.

d. Proxy Server.

A proxy server can be seen as a computer on the internet that has its own IP address that your computer knows and
it acts as a connection port between you and the internet.

How the proxy server works: When you send a web request, your request goes to the proxy's machine. The proxy
server then executes your web request, the income must be retrieved from the webserver and finally forwards the
website data so you can view the web page in your browser.
27
In addition, the proxy server can change your IP address, encrypt your data. And it can also block access to certain
websites, based on IP addresses.

Proxy servers can also act as a firewall and can provide a high level of privacy.

e. Database Server.

The database server is a computer in a LAN that stores and retrieves databases. In addition, it is a dedicated server
providing database services and it is sometimes called SQL engine. When the client sends the SQL requests to the
database server, the network database server processes the client request and the executed responses of the SQL
command return to the network computer.
Any type of computer, large or small, can serve as a database server. A database server is also very useful for
organizations that have a lot of data to deal with on a regular basis.

It also has concurrent access.

f. FTP Server.

FTP Server (short for File Transfer Protocol Server) is a software application that allows you to transfer files from one
computer to another. You can put the file on the FTP server or get the file from it.

And FTP is an age-old standard network protocol used to transfer files between other hosts and servers. It usually uses
port 21 as the medium of communication, and the FTP server will listen for client connections on port 21.

g. DNS Server.

28
The Domain Name System (DNS) can be called the Internet Directory. When you enter domain names like
facebook.com, economies.com... into your web browser, DNS will find the correct IP address for those websites and
the browser will use that address to communicate with the root server.

And the DNS server always responds to DNS queries.

h. DHCP Server.

The Dynamic Host Configuration Protocol (DHCP) server acts as a network server that automatically provides and
assigns IP addresses, default gateways, and other parameters to clients. The DHCP server assigns each client a
unique IP address. To do this, it relies on the standard protocol called Dynamic DHCP Protocol.

It is useful for large networks with lots of devices, since without it the network administrators have to manually set it
up.

i. Virtual Private Server (VPS).

A virtual private server (VPS) is a form of cloud hosting for many tenants. Each VPS is installed on a physical
machine, operated by the cloud or by a hosting provider. End users on the internet are provided with virtual server
resources through the cloud or hosting provider.

j. Cloud Server.

Cloud server is a logical virtual server built, storing applications and processing information on cloud computing
platforms on the internet. It has the same functions as a regular server but is accessed remotely from a cloud
service provider.

k. SMTP Server.
29
Simple Mail Transfer Protocol (SMTP) is an application used to send, receive and forward outgoing mail between
recipients and senders of mail.

How SMTP server works: when a mail is sent, it processes the email and decides which server to send the message
to and passes it to that server. The recipient's service provider then downloads the message and places the
message in the recipient's inbox.

IV. Discuss the inter-dependence of workstation hardware with relevant networking software(P4)

The individual components of the network such as computers, peripheral devices, interface cards ... which are
responsible for transmitting data and supporting the operations of the computer network are called Network
hardware.
Router: A hardware device that is connected to multiple channels for different networks.
Switch: It replicates information from one area of the network to another and contains more ports than the router.
Bridges: It divides traffic on the local network by dividing the LAN into different segments.
The workstation is typically an intelligent system and is built for industry standard computing functions. And the
workstation is part of a network and can also be standalone computers. It is attached to the server through the
network interface card and cable. For example, a workstation in the graphics department is usually configured as
the print server for the department.
+ Network interface card: Used to connect computers to the network so that they can communicate with the
router to receive information packets. And it defines the infrastructure of the local area network (LAN) and allows
all computers to be connected to the network.
+ Network cables are used to connect and transmit data and information between computers, routers, switches,
and storage area networks. There are three common types of cables: twisted pair cable, coax cable and multi-wire
cable. In short, the workstation hardware and the network software are interdependent and complementary. They
work together to properly deploy the network and contribute to a complete connection.

30
V. Design a networked system to meet a given specification(P5)

1. Request.
I am a network engineer at Nguyen Networking Limited Hi-Tech Network Solution Development Company. My
company has a network project from a local educational institute, namely BTEC FPT International College. And
projects requiring the design and installation of a network system have the following requirements:
+ People: 200 students, 15 teachers, 12 marketing and administration staff, 5 senior managers including the academic
and program manager, 3 computer network administrators.
+ Resources: 50 student lab computers, 35 employee computers, 3 printers.
+ Building: 3 floors, all computers and printers are on the ground floor except for IT labs - one lab is on the first floor and
another lab is on the second floor.
2. Design plan.
According to the requirements of the project, the building consists of 3 floors:
+ On the ground floor, the computers of staff and teachers will be set up here. In addition, rooms for
administrators, printers and network operators will also be available on the ground floor. In addition, I propose to
build some servers to use as Web server and also use virtualization technology to save costs (Virtual Private Server).
+ 1st floor and 2nd floor: I will put in each room 25 computers for students.
In addition, I will use internet service from 2 different carriers in case something goes wrong with either carrier.
Below is a physical diagram that illustrates the above project:

31
Picture: Network physical diagram of the building.

a. Design plan on 1st floor and 2rd floor.

32
Picture: Network physical model of Lab on 1st floor and 2rd floor.

Both the first and second floors are arranged equally. Each floor has 24 computers for students and each room uses 1
computer for teachers to facilitate the teaching process.

33
b. Design plan on the ground floor.

Picture: Network physical model of ground floor.

Network administration room:

This room is arranged with 3 computers for administrators to manage the entire school network.

Teachers and staff room:

Computers in these two rooms will be supported with printers for more convenience in the working and teaching
process.

Room Management:

5 senior managers will be given one computer each to manage all school affairs.

Server room:

34
This room will place more computers to use as a dynamic ip server for the rest of the school.

VI. Test and evaluate the design to meet the requirements and analyze user feedback(P6)

1. Check and evaluate the design for requirements.


The network system in BTEC FPT College is a small-sized school model, so it is not too complicated, but the deployed
network must still meet the following factors:
The network cable used must ensure durability and quality such as: anti-interference, tension resistance, good signal
transmission.
+ Ability to operate well: The network must meet the needs of the user well, the speed and the level of reliable security.
+ Easy to manage: The network not only needs to operate smoothly but also has to be easily managed and
monitored during operation. In addition, the network must integrate the function of remote network operation
management. + Fast and safe data exchange: Data transmission between departments and divisions must ensure
confidentiality, fast transmission speed, meeting the needs of the school.
+ Scalability: Because of the development of the school, as the demand for devices may increase. So, the network must
be scalable without having a major impact on the entire original network.

2. Equipment cost.
According to the request of passengers, the total number of computers needed is 85 machines, 3 printers. In
addition, according to the above network diagram design, we need to add: 4 switches for connecting between
departments, 2 routers to connect to 2 carriers, and a computer used as a server to provide dynamic IP for
devices. However, since we need 3 more computers to serve as the server, the total number of computers
needed will be
89.

a. Price list and detail about computers.

35
b. Price list and detail about Router.

36
c. Price list and detail about Switch.
37
d. Price list and detail about Printer.
38
e.
Other costs.

In addition to the cost to purchase the main equipment, we need additional costs such as installation fees, operating
costs…

In short, to complete a network, we will lose about 70 000 USD.

VII. Implement a networked system based on a prepared design(P7)

1. Basic configuration
a. Set hostname for devices.
39
On the Router, I proceeded to name it:

Picture: Set hostname for Router.

Likewise, on the other Router, the 4 Switches are on the ground floor, 1st floor and 2nd floor. We also proceed with
the same configuration.

Picture: Set hostname for Switch.

b. Set IP

In this network, there are 2 different network providers, so there will be 2 routers, each connected to a network
operator.

40
Picture: Logic diagrams (Demo).

On router 1 (R1): Outside the router will have a public IP of: 1.1.1.1

On router 1 (R2): Outside the router will have a public IP of: 2.2.2.1

41
Picture: Set IP for interface g0/1 on router R1

Picture: Set IP for interface g0/1 on router R2

c. Set password.

To protect the switch, on the switch (S-Core) I set the password types: console password, vty password, enabel secret.

42
Picture: Set password for Switch.

2. On Switches.

a. Create VLANs.

vlan 10 - 172.12.10.0/24 - Default


vlan 20 - 172.12.20.0/24 - Staff
vlan 30 - 172.12.30.0/22 - Student
vlan 40 - 172.12.40.0/25 - Teacher
vlan 50 - 172.12.50.0/26 - Manager
vlan 60 - 172.12.60.0/24 - Guest
vlan 70 - 172.12.70.0/24 - IT
vlan 80 - 172.12.80.0/24 - Server

43
b. Configure VTP.

To synchronize information of VLANs on all switches together.

The port is asynchronous because the switch has different port numbers.

Conditions for the remaining switches to receive VTP:

+ The lines between the Switches must be trunk roads:

Picture: Configuring Trunking

Then, configuring VTP mode Server on switch(S-Core):

44
Picture: Configure VTP mode server on switch core

Configure VTP mode client on switch ground floor, 1st and 2nd floor:

Picture: Configure VTP mode client on switch ground floor, 1st and 2nd floor.

45
3. On R1 and R2

a. Configure routing between VLANs.

On these two routers, we have to configure routing between VLANs by creating sub-interfaces.

Picture: Configure routing between VLANs on R1

Similar to the router R1, we continue to configure routing between VLANs on router R2

Picture: Configure routing between VLANs on R2.


46
b. NAT Configuration.

In order for the machines on our network to connect to the Internet, we need to configure NAT many to one (PAT) on
both routers.

Picture: Configure NAT many to one (PAT) on router.

On the R-BTEC-02 router, we do the same thing as the R-BTEC-01 router.

In addition, I also allow machines from outside the Internet to access Web Server through ports 80 and 443
(172.12.80.100 is the IP of Web Server)

47
Picture: Configure Nat on router.

c. DHCP.

As mentioned in the system design section, I will use a computer as a DHCP server, which helps provide dynamic IP to
students, teachers and staff computers.

First, on my computer, go to Services and turn on DHCP.

- Create pools: staff, students, teacher.

+ Network, subnet mask

+ Default gateway

+ DNS

+ Max Ips

48
Picture: Create pools: staff, students, teacher on computer.

Then, Configure the DHCP Relay Agent on the R1 and R2 routers.

Picture: Configure the DHCP Relay Agent on router.

d. Static routing.

Configuring on the router so that computers can find their way to the internet.

Picture: Static routing on router R1

On the R2 router, we do the same.

4. ACL.
a. Ban VLAN 30 - Student accesses VLAN 80 - Server by Web, Other normal access protocols.

49
b. Only VLAN 70 - IT can telnet to S-Core

5. HSRP (Hot Standby Routing Protocol).


To prevent one router failed, the system will still function normally through the other router, we will use the HSRP
protocol. We will configure to create a virtual gateway router as a gateway for LAN to redundancy gateway for the
system. In addition, we will configure the track for the HSRP protocol.
On the R1 router: Active for vlan: 10,30,50. Standby for vlan: 20,40,60

Picture: Configure HSRP on router R1


On the R2 router: Active for vlan: 20,40,60. Standby for vlan 10,30,50

Picture: Configure HSRP on router R2


50
VIII. Document and analyse test results against expected results.

1. VLAN.

After creating the VLAN, computers belonging to the same VLAN can communicate with each other. And after routing
between VLANs on the router and configuring vtp on switches, other VLAN devices can ping each other as well.

Example of a VLAN 30 computer (student int lab 1) pings to VLAN 20 (staff in ground floor):

Picture: Student’s computer pings to staff’s computer.

2. DHCP.
After configuring DHCP, devices in the network are completely granted free IPs corresponding to each VLAN.
Example of automatically receiving IPv4 of computer in VLAN 20 (staff):

51
Picture: Computer under VLAN 20 receives dynamic IP.

3. Static routing and NAT.


Configuring static routing and NAT helps devices access to the Internet.
Example of a computer in VLAN 30 (student) accessing Google DNS:

52
Picture: Successful Google DNS access.
4. ACL.
The ACL configuration has prohibited VLAN 30 (student) from accessing VLAN 80 (Server).

53
Picture: The student's computer cannot access the Web Server.
As we can see, the student's computer cannot access the web server.
And the computers belonging to the remaining VLANs can still access the Web Server.

Picture: The Staff’s computer can access the Web Server.


5. HSRP (Hot Standby Routing Protocol)
After configuring HSRP on both routers and turn on active and standby for each VLAN.
The computers belonging to VLAN: 10,30,50 will go to the Internet through router R1. For
example:
54
Picture: The computers of Vlan 30 go to the internet via router R1. Computers
belonging to VLAN: 20,40,60 will go to the Internet through router R2.

Picture: The computers of Vlan 20 go to the internet via router R2


55
And if there is a problem with the transmission line in the R1 router, the computers belonging to Vlan: 10,30,50 will
access the internet through the R2 router and vice versa. The computers of Vlan 20 go to the internet via router R2.
For example:

Picture: The computers of Vlan 20 go to the internet via router R2

56
IX. Conclusion.

- In summary, in this report, I have outlined the principles and protocols of the network. Briefly explain about the
deaths. In particular, I have designed a basic network system for BTEC FPT International College.

X. References.

- GeeksforGeeks. 2020. Types Of Area Networks - LAN, MAN And WAN - Geeksforgeeks. [online] Available at:
<https://www.geeksforgeeks.org/types-of-area-networks-lan-man-and-wan/> [Accessed 15 October 2020].
- Services, P., 2020. What Is A LAN? Local Area Network. [online] Cisco. Available at:
<https://www.cisco.com/c/en/us/products/switches/what-is-a-lan-local-area-network.html> [Accessed 15 October
2020].
- CSEstack. 2020. 12 Advantages And Disadvantages Of OSI Model Layered Architecture. [online] Available at:
<https://www.csestack.org/advantages-disadvantages-of-osi-model-layered-architecture/> [Accessed 15 October 2020].
- ElProCus - Electronic Projects for Engineering Students. 2020. Network Devices In Computer Network : Different Types.
[online] Available at: <https://www.elprocus.com/what-are-network-devices-and-their-types/> [Accessed 15 October
2020].
- Tutorialspoint.com. 2020. Advantages And Disadvantages Of The TCP/IP Model. [online] Available at:
<https://www.tutorialspoint.com/Advantages-and-Disadvantages-of-the-TCP-IP-Model> [Accessed 15 October 2020].
- Techterms.com. 2020. Application Server Definition. [online] Available at:
<https://techterms.com/definition/application_server> [Accessed 15 October 2020].
- Techterms.com. 2020. Print Server Definition. [online] Available at: <https://techterms.com/definition/print_server>
[Accessed 15 October 2020].
- Inside Out Security. 2020. What Is A Proxy Server And How Does It Work?. [online] Available at:
<https://www.varonis.com/blog/what-is-a-proxy-server/> [Accessed 15 October 2020].
- Titan FTP Server. 2020. What Is An FTP Server?. [online] Available at: <https://titanftp.com/2018/09/11/what-is-anftp-
server/> [Accessed 15 October 2020].
57
- Thakur, D., 2020. What Is Database? - Computer Notes. [online] Computer Notes. Available at:
<https://ecomputernotes.com/fundamental/what-is-a-database/database> [Accessed 15 October 2020].
- 2020. [online] Available at: <https://www.cloudflare.com/learning/dns/what-is-a-dns-server/> [Accessed 15 October
2020].
- Infoblox. 2020. What Is A DHCP Server? | Learn What They Are & How They Work | Infoblox. [online] Available at:
<https://www.infoblox.com/glossary/dhcp-server/> [Accessed 15 October 2020].
- Ibm.com. 2020. VPS. [online] Available at: <https://www.ibm.com/cloud/learn/vps> [Accessed 15 October 2020].
- SendGrid. 2020. What Is An SMTP Server? | Sendgrid. [online] Available at: <https://sendgrid.com/blog/what-is-ansmtp-
server/> [Accessed 15 October 2020].
- Spamlaws.com. 2020. What Is Network Hardware And How Does It Work?. [online] Available at:
<https://www.spamlaws.com/how-network-hardware-works.html> [Accessed 15 October 2020].

58

You might also like