StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Packet Tracer Design - Term Paper Example

Cite this document
Summary
The paper "Packet Tracer Design" analyzes that packet tracer design is appropriate for ensuring that the client's needs are met. The Packet tracer is a network simulation program that allows the designers to understand the network's different behaviours…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER99% of users find it useful

Extract of sample "Packet Tracer Design"

Abstract

Aryam Network café has been facing network and security challenges. The packet tracer design was used to carry out a simulation in order to aid in the development of the most appropriate network that meets the needs of the client. The mesh typology was selected from the simulation as it met most of the requirements of the client. During the design, the I-P-U model was selected in order to ensure that all the requirements are established. The development phase was the most crucial for the team as it involved the implementation of the design in order to build the network. The development stage involved the physical arrangement of the hardware and installation of software. The most crucial aspect in the development stage was the configuration and development of the IP address. Testing was carried out after the development and the results were satisfactory as all the needs of the client were met. Training of the personnel of the company was carried out in order to enable them use the system. The team members however require further studies on the aspects of configuration. This is due to the challenges that the members were faced with during the configuration process. The design and development process was generally successful.

Introduction

Implementation phase of a network design is the most crucial stage. This process requires a lot of expertise as well as technical skills. Packet tracer design is appropriate for ensuring that the needs of the client are met. The Packet tracer is a network simulation program that provides the designers to understand the different behaviours of the network. The implementation process also involves the creation of topologies that imitate the modern computer networks. This therefore leads to solving the challenges faced by the client. When using the packet tracer, a simulated command line interface is utilized. The use of drag and drop user interface enables the addition as well as the removal of the simulated network devices in order to effectively develop the network that is required (Schwalbe, 2013). The packet tracer is usually downloaded and it is commonly used in the design of networks through a simulation process. The development process using the packet tracer will be carried out based on the challenges of the facing the client. The simulation process makes it easy for the implementation process to be carried out as different requirement can be established during the process. The chances of errors and poor performance during the process are avoided through the simulation (Ren, Kinsy & Zheng, 2015). The packet tracer design was selected for the project due to its ease of use as well as the ability to develop a clear simulation of the network in relation to the challenges facing the client. The paper thus discusses the aspect of implementation in relation to the project.

Design

The packet tracer design played a vital role in the design process through developing simulations about the behavior of the network. The first step of the design involved the aspects of the data traffic. The examination of traffic involves the determination of its aspects and characteristics (Sutcliffe, 2013). This step is useful in establishing the traffic that will be passed through the corporate locations over the proposed network. A flow analysis was conducted which played a vital role in establishing the source and destination of each conversation. Aryam Network Café is expected to have high network traffic due to the different branches as well as the number of clients. The flow analysis that was carried out during the design also played a vital role in establishing the communication between the workstations and the server. Based on the traffic and the packet tracer simulation, the mesh typology was selected and designed. The typology plays a significant role in representing the relationship of all the links that connects the devices and nodes. The typology also plays a vital role in defining how the network is physically laid out (Feng, et al, 2011). It also provides a representation of how the data flows through the network. In the Mesh typology, each device has a dedicated point to point link with every other device. One of the main advantages of this typology is that a breakdown in one of the computers does not a total network breakdown. This will therefore ensure that the network continues to operate in case of a breakdown or maintenance of one or more computers.

Figure 1: Design of the mesh typology

In order to ensure the full operation of the mesh typology and to meet the needs of the client, five routers will be required. DCE cables will be used for the purposes of establishing communication between the routers.

Figure 2: Mesh typology connection

The simulation of the typology through the use of a packet tracer design was carried out in order to determine its characteristics. This was an important aspect during the design in order to ensure that the required improvements are made. The hardware and software that were initially used by the client were old. The design indicated that new hardware and software was required in order to meet the needs of the client. In order to ensure that the network is redundant, the security needs were considered during the design. The firewall and anti-virus was part of the network.

Figure 3: Simulation of the mesh typology

The aspects of network reliability are important during the design (Biocca & Levy, 2013). The reliability of the network was considered during the design. An appropriate model has to be selected during the design process so as to ensure reliability. The I-P-O model was select and applied during the model. This model mainly involves a review of the Input, Processing and Output. The model established some of the useful characteristics as well as the network requirements. The model can be represented through the use of the following table.

Inputs

Processing

Output

Characteristics of the local data

Network device characteristics

Area network circuit and characteristics

LAN data

Transport protocol

Internet Access

Multimedia

SNA

Voice

Video

Payload types

Cluster controllers

T1-MUXs and Switches

Frame relay MUXs and switches

T1-channel banks

ADSL devices

Routers

Switches

Video

Modem

Internet access

Circuit-switched WAN services

T1

T3

Frame relays

Development

The development phase is the most vital as it involves the actual implementation of the design. A number of activities were carried out at this stage using different tools in order to ensure that the network is up and running (Sabherwal & Becerra-Fernandez, 2010). Activities during this phase are mainly aimed at building the network. Based on the design and typology, all the hardware and software were physically installed as required in order to support the network. This involves the process of installing the new computers as well as the routers and switches before installing the software. The python language was selected during the development process. The python language is considered one of the most fluid languages that are also easy to learn (Biocca & Levy, 2013). It was selected due to its simplicity as well as the ability to support a very large community. The expected traffic could also be supported by the language and hence its selection. This type of programming language is increasingly becoming common in the network development. The database plays an important role in the storage of information. The manner in which the data can be stored is mainly dependant on the model used. The hierarchical model was used during the development process. The selection was made based on the ability to meet the data storage requirement of the client. When using the hierarchical model, the data is organized in a tree like structure that implies a single parent for each of the record.

The relationship between the different types of data is also enhanced through the use of this model. One of the major problem that the client had been faced with in the past involved the loss of data. The model selected is effective in ensuring that a high amount of data is stored safely. The physical order of record storage is usually utilized when this model is used. The network configuration was part of the development process. Network configuration is a complex process that requires a lot of expertise (Biocca & Levy, 2013). The process began with the development of a host name. A host name is mainly a unique name that is created to identify a machine on a network. In order to ensure that the other machines are able to address the host by the name, a service that resolves the hostname was developed. Fixed device names were used during the process for the purpose of avoiding configuration problems. Interface changing the names is responsible for the device configuration problems. The presence of a predictable network interface names play an essential role in automatically assigning the static names to network devices. The configuration of the IP address on the end devices is an important aspect that determines the success of the network. An address table was used for the purposes of configuring the IP address. This was achieved through accessing the desktop platform on each of the device and locating the IP configuration section.

The main aim of configuring the IP address on the end devices is to enable the device to be on the right network. The configuration of the network on the routers and switches was also carried out during the development process. The configuration of the IP addresses on the routers and switches also requires the use of a table (Feng, et al, 2011). This process was however carried out differently from the configuration of the IP address on the end devices. The configuration of the IP address on the routers and switches was carried out through clicking and opening the command line interface. This is followed by typing the right command in order to configure the right address for the router. This process is crucial and it plays a significant role in determining the success of the process. Alternatively, this process can be carried out through the use of a console cable from an end device to the router. The device command line is however required when this method is used. Configuration of the default gateway was also carried out during the development process. The configuration of the IP address in the default gateway is also carried out with the aid of an address table. The IP address varies depending on the network typology (Lukyanenko, et al, 2014). The tables provide an opportunity for ensuring that the IP address is correctly calculated. All the processes and activities during this stage were documented. The security measures were then put in place based on the requirements of the design.

The netmasks and broadcasts were configured accordingly for the purposes of ensuring that the security is improved. This is important for the purposes of future references as well as the maintenance of the system. It is important to note during the development phase that the configuration of the gateway is vital. The default gateway has to be configured correctly in order for the system to work successfully. Before the network is operational, the permission to connect to the server has to be obtained. This is a process that ensures the functionality of the network takes place. During the development process other stakeholders were also involved. This includes the experts who provided technical assistance and the owner who was mainly responsible for sponsoring the project. In order to improve on the functionality of the network, IP address aliasing was carried out. This process involves adding more than one IP address to a network interface (Schwalbe, 2013). The presence of more than one node or multiple connections are established and this allows for different activities to be carried out. This is also vital ion ensuring that the servers can be reorganized without necessarily updating the other machines. The configuration of the cable modem was carried out in a way that it only recognizes one client. This will be part of the security measure to enable the client to carry out their operations without intrusion. At the end of the configuration and development process testing and development of trouble shooting mechanism was put in place.

Testing and implementation

Testing is an important process that is used to determine the ability of the network to meet its goals and objectives. After the configuration, the connectivity has to undergo testing. This was achieved by opening a command prompt window on the end devices. Pinging of the address was also carried out on the network in order to determine its response. During the process, a reply has to be obtained as it is an indication of correct configuration (Ren, Kinsy & Zheng, 2015). In case of a wrong configuration, the no response will be obtained during the process. Other aspects that were tested include the speed of the network. This is considering that the client had indicated the previous network was slow and it affected the business transactions. A method known as Totusoft’s LAN speed test was selected as it is the quickest and easiest way of testing the network speed. The test is also useful in terms of testing the windows machine which is an important aspect of the hardware (Feng, et al, 2011). This test usually run from the memory of the computer band it does not require the setting up of the client and server machine. This method is simple and it only requires browsing to a network and selecting as well as sharing the files and the output units. The tests indicated that the network can operate up to a LAN Speed of 441 Mbps. This speed is quite high and it has the ability enabling the transaction to be carried out within a short period of time.

Netstress is an important aspect that needs to be determined through the testing process. It is useful in determining the ability of the system to work effectively under the required stress (Biocca & Levy, 2013). The test was vital in indicating that the network has the ability of functioning effectively under a high traffic. The client had indicated that the previous network was prone top errors and hence affecting how the transactions were being carried out. The netmeter test was carried out in order to monitor the performance of the network. This is achieved by determining what happens when a file or folder is transferred. The levels of accuracy are high when using this tool to monitor the performance of the system. The NetMeter is also capable of determining the bandwidth consumption. An alarm is triggered when the limit that has been set is reached. The final test is useful in terms of determining the efficiency regarding the use of the system and its ability to meet the needs of the client. The other tool that was applied during the process of testing the network involved the iperf. This plays an important role in the process of determining what the network is capable of (Biocca & Levy, 2013). The ability of determining what the network is capable of is useful during the test as it determines the extent that the needs of the client have been met. Testing also involved the aspects of security. This test was conducted order to determine how secure the network is.

Penetration testing is one of the tests that were conducted in order to determine the vulnerabilities of the network. It involved troubleshooting the network to determine the vulnerabilities that may be exploited by the hackers. The other tests that were carried out involved Open Source Security Testing Methodology Manual, and NIST penetration testing methodology. The client had previously been faced with loss of network connection and security problems. These aspects had to be considered during the tests in order to ensure the client will not be faced with similar challenges. All the activities during the testing process as well as the results obtained were documented. This is vital information about the performance of the network (Sabherwal & Becerra-Fernandez, 2010). The client as well as his representatives was present during the testing process. This is important in ensuring that the results of the tests are acceptable to all the parties involved. The results however indicated that all the requirement of the design had been met. This was an indication that the packet tracer simulations were vital in the process as it provided information about the performance of the network. The appropriateness of the design is usually determined during the final test. The system can then be operated after the final stage. However, in the course of operation, it has to be maintained from time to time. The implementation phase after the tests involves the actual use of the system.

The maintenance of the network is vital in ensuring efficiency as well as reducing costs that may be associated with serious breakdown. The maintenance of a network is dependent on its performance as well as the specifications provided (Sabherwal & Becerra-Fernandez, 2010). A manual was developed in order to assist the client in the maintenance process. Detailed information was provided to the client through the manual. In most cases, the developers are usually responsible for the maintenance of the system after the completion of the design. This agreement with the client was signed so as to ensure that the team continues to carry out the process. The team was also responsible for training the staff members of the network café together with the client. This is an important aspect aimed at ensuring that the client is familiar with the operations of the network. The optimization phase is vital during the implementation and use of the network. Optimization is a process that ensures the proactive management of the network (Ren, Kinsy & Zheng, 2015). The goal of the proactive management is to ensure that issues are identified in advance before they affect the organization. The manual developed also provides all the information about trouble shooting in order to improve on its operation. The trouble shooting manual is vital in enabling the client to deal with minor operational problems. It is also important to note that the reactive fault detection can be vital in determining the needs for redesign incase of failures or inefficiency.

Discussion

The implementation process is a difficult task as high levels of accuracy is required. The Plan-Do-Check-Act approach was used during the design and development of the project. The Plan phase mainly involves assessing the information security risks in relation to the challenges that the client was faced with. A packet tracer design simulation played a vital role during the design process. It provided a real case scenario that led to the selection of the appropriate typology. The mesh typology that was selected was vital in terms of ensuring that the needs of the client are met. During the network design, the simulation was also important in ensuring that the appropriate hardware and software is selected. The use of the mesh typology is commonly used in the network design. It is effective in terms of dealing with networks that serves businesses with branches at different locations (Ren, Kinsy & Zheng, 2015). The model that was used during the design and it played a vital role in terms of ensuring that the required software as well as hardware is determined. The process of designing a network is time consuming due to the detailed nature of the requirements. The success of the design is dependent on the teamwork as well as the coordination of activities. The development of the network is vital as it involves the actual building of the network. The network building process involves setting up the hardware and installing the software. Although the simulations provided the team with a scenario of how the system will operate, the process was quite challenging.

The most difficult task during the development process involved the configuration. The development of an IP address is a critical process that requires a lot of accuracy as well as expertise. The IP address calculator is commonly used during the process of determining the IP address. However, this requires technological knowhow as well as expertise. The configuration of the network took a lot of time and the team members were keen to avoid errors. A step by step approach was applied by the team during the configuration process which was also carried out several times. Failures were experienced initially but it was overcome by the approach that was taken. The team members also found it important to consult with the experts so as to avoid errors. The tests that were conducted indicated that the network was effective and it met the needs of the client. The testing process is useful in designing and developing a network as it determines its effectiveness (Schwalbe, 2013). This process however lasted for a short period of time due to the successes that were encountered in the initial stage. One the configuration is effective, the system is capable of operating without encountering much operational challenges. However, the security threats may impact negatively on the network. It is for this reason that tests were conducted in order to determine the ability of the security system to respond and counter the threats. All the processes were documented during the development process.

The documentation of the activities during the development phase is vital in ensuring that the information can be used in future (Schwalbe, 2013). This is considering that various challenges were encountered. During the network design and development, the process challenges will always be encountered and hence the importance of the documentation. The client and his representatives were involved in every step of the development and testing. It is important to ensure that the client and their representatives are involved in the testing process as they will be involved in its operations. It is important for the network developers to ensure that the user manual is in place. The team made an agreement with the client to be involved in the maintenance process. The training of the personnel is mandatory when a new network is put in place. The team was involved in the training process after the development and testing of the network. The design and development of the network highlighted that the members still require some training in various areas of information technology and systems. The members need to study the aspects of network configuration. More focus needs to be put on the process of generating the IP address at it is vital during the development phase. The studies will improve on the ability of the members to configure the network and ensure that it is fully operational. Additional knowledge on security and network testing may also be required of the team members so as to improve on their capabilities.

Read More
The NetMeter is also capable of determining the bandwidth consumption. An alarm is triggered when the limit that has been set is reached. The final test is useful in terms of determining the efficiency regarding the use of the system and its ability to meet the needs of the client. The other tool that was applied during the process of testing the network involved the iperf. This plays an important role in the process of determining what the network is capable of (Biocca & Levy, 2013). The ability of determining what the network is capable of is useful during the test as it determines the extent that the needs of the client have been met. Testing also involved the aspects of security. This test was conducted order to determine how secure the network is.

Penetration testing is one of the tests that were conducted in order to determine the vulnerabilities of the network. It involved troubleshooting the network to determine the vulnerabilities that may be exploited by the hackers. The other tests that were carried out involved Open Source Security Testing Methodology Manual, and NIST penetration testing methodology. The client had previously been faced with loss of network connection and security problems. These aspects had to be considered during the tests in order to ensure the client will not be faced with similar challenges. All the activities during the testing process as well as the results obtained were documented. This is vital information about the performance of the network (Sabherwal & Becerra-Fernandez, 2010). The client as well as his representatives was present during the testing process. This is important in ensuring that the results of the tests are acceptable to all the parties involved. The results however indicated that all the requirement of the design had been met. This was an indication that the packet tracer simulations were vital in the process as it provided information about the performance of the network. The appropriateness of the design is usually determined during the final test. The system can then be operated after the final stage. However, in the course of operation, it has to be maintained from time to time. The implementation phase after the tests involves the actual use of the system.

The maintenance of the network is vital in ensuring efficiency as well as reducing costs that may be associated with serious breakdown. The maintenance of a network is dependent on its performance as well as the specifications provided (Sabherwal & Becerra-Fernandez, 2010). A manual was developed in order to assist the client in the maintenance process. Detailed information was provided to the client through the manual. In most cases, the developers are usually responsible for the maintenance of the system after the completion of the design. This agreement with the client was signed so as to ensure that the team continues to carry out the process. The team was also responsible for training the staff members of the network café together with the client. This is an important aspect aimed at ensuring that the client is familiar with the operations of the network. The optimization phase is vital during the implementation and use of the network. Optimization is a process that ensures the proactive management of the network (Ren, Kinsy & Zheng, 2015). The goal of the proactive management is to ensure that issues are identified in advance before they affect the organization. The manual developed also provides all the information about trouble shooting in order to improve on its operation. The trouble shooting manual is vital in enabling the client to deal with minor operational problems. It is also important to note that the reactive fault detection can be vital in determining the needs for redesign incase of failures or inefficiency.

Discussion

The implementation process is a difficult task as high levels of accuracy is required. The Plan-Do-Check-Act approach was used during the design and development of the project. Read More

Cite this document
  • APA
  • MLA
  • CHICAGO
(Packet Tracer Design Term Paper Example | Topics and Well Written Essays - 4000 words, n.d.)
Packet Tracer Design Term Paper Example | Topics and Well Written Essays - 4000 words. https://studentshare.org/design-technology/2093524-packet-tracer-design
(Packet Tracer Design Term Paper Example | Topics and Well Written Essays - 4000 Words)
Packet Tracer Design Term Paper Example | Topics and Well Written Essays - 4000 Words. https://studentshare.org/design-technology/2093524-packet-tracer-design.
“Packet Tracer Design Term Paper Example | Topics and Well Written Essays - 4000 Words”. https://studentshare.org/design-technology/2093524-packet-tracer-design.
  • Cited: 0 times

CHECK THESE SAMPLES OF Packet Tracer Design

Is Internet Anonymity a Myth or a Reality

rdquo; From the discussion of the design issues, implementation techniques, the types of attacks, and the countermeasures used to overcome the attacks, it has been found that in most of the scenarios, a common user could get an acceptable level of anonymity by the usage of low latency networks like Tor and other multi-proxy aggregate services....
104 Pages (26000 words) Thesis

Denial of Service Issues and Solutions

Denial of Service Attacks I.... Literature Review 1.... Definition Denial of Service (DoS) is the disruption of an entire system, either by disabling the system or by overloading it with messages so as to degrade performance.... (Stallings, 2006) In DoS attacks, attackers hold the data to modify or change it so that the data transfer time will be longer than usual to reach the intended websites or servers....
19 Pages (4750 words) Dissertation

Traditional and Wireless IDS/IPS Techniques

This essay focuses on Traditional and Wireless IDS/IPS Techniques.... Most IPS/IDS (Intrusion Prevention System / Intrusion detection system) programs typically use signatures of known cracker attempts to signal an alert.... Others look for deviations of the normal routine as indications of an attack....
5 Pages (1250 words) Research Paper

Firewall Security Measures

Admittedly, layers 3 and 4 of OSI models use packet filtering as a firewall security measures, with IP address in the packets, and also the ports used to filter session that is admitted or otherwise drop.... A packet filter is the most simple type of firewall that operates at the network layer of OSI model.... packet filtering works on a set of rules stored as rule base, which determines which packet are allowed within the session, likewise which address are allowed for the communication process....
13 Pages (3250 words) Essay

How to Use Wireshark to Capture a Packet Trace

In this report “How to use Wireshark to Capture a packet Trace” the author will assess Wireshark technology-based application with respect to its overall technological working, operations, history and mainly for the Linux based services administration.... As this is a packet switching network framework (a network works on data packets communication).... In this scenario, data will be transmitted to the right destination system formed on the basis of information created in the network packet header (Codex-M, 2011) and (Lamping, Sharpe, & Warnicke, 2011)....
12 Pages (3000 words) Assignment

Network Traffic and Performance

hellip; Although scheduling techniques work well in managing packet flows through a network system, they suffer a common problem during periods of congestion.... For TCP this kind of bursty packet loss is particularly damaging, leading to overall inefficiency in TCP throughput for all network users.... The first issue to address is whether to do this on a per-packet basis or on a flow basis.... The per-packet mechanism, for instance, 'round robin' is likely to result in fairer resource allocation but is also more likely to result in problems with retransmissions if end systems cannot re-sequence packets....
13 Pages (3250 words) Lab Report

Penetration Testing in Network Security

enetration testing entails security evaluation of a company's interconnection of computer systems with an effort to circumvent the security status of its key features based on the system design and implementation of the networking services.... This report "Penetration Testing in Network Security" presents corporate organizations to maintain their integrity and avoid revealing confidential data to third parties; penetration testing of the corporate network has to be perfectly conducted by the network administrators....
10 Pages (2500 words) Report

Design Internet Services Providers Network

This report "design Internet Services Providers Network" discusses the commercialization of the internet, it has received phenomenal success and exponential growth.... Using these principles as a guide, we will design a network that offers Internet Services Providers (ISPs) flexibility in realizing their objectives.... From this argument, it is not practical to develop a network that has many users without carefully design the network itself to handle the demand....
6 Pages (1500 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us