StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network and Configuration - Report Example

Cite this document
Summary
This report "Network Report and Configuration" focuses on and explains the design and implementation of a given network scenario. The requirement is to connect all the headquarters of the Company. The headquarters based in the United Kingdom, Brazil and India…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.2% of users find it useful
Network Report and Configuration
Read Text Preview

Extract of sample "Network and Configuration"

Network Routing Network Routing INTRODUCTION The outcome of this report will explain the design and implementation of given network scenario. The requirement is to connect all the headquarters of the Company. The headquarters based in United Kingdom, Brazil and India. This report will also give a brief explanation of the protocol that will used for configuration of the network along with its pros and cons. Configuration of WAN and LAN components are also included.This project also requires the configuration of VLANs and inter-VLAN routing. Screenshots of the working shall also be included with the appropriate responses from the devices. PROTOCOL: The protocol that is given for the completion of the task is Open Shortest Path First (OSPF) version 2. It falls in the category of link-state routing protocol. So we shall start with some information on what is link-state. LINK-STATE Link-state is a mechanism that follows the condition and connection type of every connected link and develops a metric calculation that is based on some factors that also included the factors that were set by the network engineers. The functionality of the link-state protocols is that it knows the status of the link, whether it is up or down and what is its bandwidth and calculates a cost to use that path. As we know that every router run routing protocols to find out the best path to the destination, one can consider the link-states as representing the status of the interfaces on the router. (Davis, 2002) The functionality of a link-state protocol is this that it may take a path with more number of hops, but uses the medium that has higher bandwidth than all the other paths even with lowest number of hops. Due to the features of media type awareness and other factors, these protocols consume more processing power and memory. Link-state influences all the routers that structure up the complete topology of the whole internetwork (or of the position where router is presently located), this means that every router contains the same information of the topology. Due to this whenever a change is occurred it is broadcasted to the entire topology. This method of routing is known as shortest path first. Protocols that work on link-state mechanism are OSPF, EGP and BGP mechanism. KEY-POIINTS: It uses Dijkstra algorithm for the calculation of shortest path. (Zhang, 2011) Every router in the network builds up the complete topology in its routing table, thus each router contains equal amount of information. It consumes space and memory more than distance vector. It is suitable for implementing in large networks. VLAN and Inter VLAN Routing VLANs are configured in a LAN environement to divide broadcast domains. The communication between the two host in two different VLAN requires roouting of traffic. This routing of traffic is known as inter-VLAN routing. DESIGN AND IMPLEMENTATION The design of this network implements the connection between the networks of all headquarters located in UK, Brazil and India. WAN communication between the headquarters is done by using routers. The routers are configured with Open Shortest Path First (OSPF) protocol that has fast convergence and is able to meet the demands of a large organization. The routing protocol is configured on all of the routers mentioned in the topology diagram and advertises to every host connected in the topology except the loopback interfaces attached with the United Kingdom HQ and IndiaHQ. Further VLANs are created on all the local network with VLAN 20 representing ADMIN and VLAN 30 representing the SALES department. NETWORK DESIGN BACKGROUND This report is for the demonstration of network design for Company’s local area network situated in of Networking. Company has Headquarter at UK, Brazil and India. All of these headquarters are attached with each other with WAN links. Protocol recommendation for this implementation is OSPF which is open standard and is equiped with fast convergence and support routing update security. Open Shortest Path First veraion 2(OSPFv2) is the best solution for given scenario and also for large scale businesses having offices at different locations. In this network design topology three routers are interconnected logically and each router is further directly connected with two more networks. OSPFv2 routing protocol is configured within the logical network: network topology from the network design above both the physical and logical network topology can be obtained. Using the above topology an IP-addressing scheme was created to accommodate the all the given number of hosts in the network. For accomplish this, the private provided IP i.e. 192.168.20.0/22 needs to be sub-netted. IP-addressing for all the headquarters is as follows. UK: 192.168.20.0 /23 Brazil: 192.168.22.0 /24 India: 192.168.23.0 /25 Host in the network will use either static IP configuration or DHCP as shown in the topology. VLANs for each host in a single headquarter is different i.e. 1. VLAN 20 for admin department. 2. VLAN 30 for sales department. ANALYSIS OF THE PROTOCOL Open source dynamic routing protocol proposed for above scenario is Open Shortest Path First version 2 (OSPFv2). It works on the mechanism of link-state routing. It has ability of faster convergence. OSPFv2 is has the features that makes it suitable for larger networks. Routers that are configured with OSPF, exchange Hello packets with all the neighbours, they collect costs and Router ID (RID) for the entries in routing table. This information of neighbour is recorded in the adjacency database. (Nogueira, 2013) After recording the information in the adjacency database a link-state advertisement is sent that contains information like Cost to, and RIDs of the entire neighbour. All the routers in the topology share its link-state with every other router in that topology. These link-state-advertisements are than kept in the routing tables i.e. the link-state-database (LSDB). For calculating the shortest path, SPF algorithm is used on every router. After calculating the best path Routers post these paths for inclusion in the routing table. NETWORK DESIGN The network topology design consists of three routers, UK, Brazil and India. UK and Brazil are connected via 2Mbps Serial WAN links. Brazil and India are connected to each other with 256Kbps serial WAN link (serial ports). While UK and India are connected to each other with 256Kbps WAN link. Directly connected networks are using Fast-Ethernet Fa0/0.20 and Fa0/0.30 subinterfaces on UK HQ router and same for Brazil and India headquarters. OSPFv2 is configured on all the interfaces with MD5 authentication scheme. Key for authentication is “packet” (without quotes). In the event of a failed primary link (2Mbps), traffic will be routed via the 256Kbps link. DESIGNED TOPOLOGY ADDRESSING SCHEME The private network address 192.168.20.0/22 has been given to develop an IP addressing scheme for accommodation of all the devices in the topology. Hosts are assigned the IP address as per the given topology UK and Brazil hosts will get IP from their routers while satatic configuration would be done on Indian LAN hosts. Switches connected with the routers are configured are TRUNKs for VLANs. While sub interfaces are configured with the VLAN numbers. Sub interfaces different subnets to communicates with the VLANS so we further super subinterface the given IP scheme of each headquarter. IP Address for Loopback interface given 189.54.69.254 connected with the UK router for internet is assigned for it designated subnet. Another IP address 10.10.10.10/32 for loopback connected with the India router for web server. Despite of the fact that the proper loopback address that issued for ping test within system this address is used within the network, it does not talk back at itself. NETWORK ADDRESSING SCHEME: No. of host per subnet is just assumption as we have super net the subnets given for subinterfaces. Device Interface Number of Hosts Subnet Address Subnet Mask Broadcast Address Useable Addresses Default Gateway UK (HQ) Fa0/0.20 254/24 192.168.20.0 255.255.255.0 192.168.20.255 192.168.20.1 - 192.168.20.254 192.168.20.1 Fa0/0.30 254/24 192.168.21.0 255.255.255.0 192.168.21.255 192.168.21.1 - 192.168.21.254 192.168.21.1 S0/0/1 2/30 192.168.23.133 255.255.255.252 192.168.23.135 192.168.23.133 - 192.168.23.134 192.168.23.133 S0/0/0 2/30 192.168.23.129 255.255.255.252 192.168.23.131 192.168.23.129 - 192.168.23.130 192.168.23.129 Brazil (HQ) Fa0/0.20 126/25 192.168.22.0 255.255.255.128 192.168.145.63 192.168.22.1 - 192.168.22.126 192.168.22.1 Fa0/0.30 126/25 192.168.22.128 255.255.255.128 192.168.145.191 192.168.22.129 - 192.168.22.254 192.168.22.129 S0/0/0 2/30 192.168.23.130 255.255.255.252 192.168.23.131 192.168.23.129 - 192.168.23.130 192.168.23.130 S0/0/1 2/30 192.168.23.137 255.255.255.252 192.168.23.139 192.168.23.137 - 192.168.23.138 192.168.23.137 India (HQ) Fa0/0.20 62/26 192.168.23.0 255.255.255.192 192.168.23.63 192.168.23.1 - 192.168.23.62 192.168.23.1 Fa0/0.30 62/26 192.168.23.64 255.255.255.192 192.168.23.127 192.168.23.65 - 192.168.23.126 192.168.23.65 S0/0/0 2/30 192.168.23.134 255.255.255.252 192.168.23.135 192.168.23.133 - 192.168.23.134 192.168.23.133 S0/0/1 2/30 192.168.23.138 255.255.255.252 192.168.23.139 192.168.23.137 - 192.168.23.138 192.168.23.138 ASSIGNED ADDRESS TO EACH HOST PC: Device Interface IP Address Subnet Mask Wild Card Mask UK Fa0/0.20 192.168.20.1 255.255.255.0 0.0.0.255 Fa0/0.30 192.168.21.1 255.255.255.0 0.0.0.255 S0/0/1 192.168.23.133 255.255.255.252 0.0.0.3 S0/0/0 192.168.23.129 255.255.255.252 0.0.0.3 Lo0 189.53.60.254 255.255.255.252 Brazil Fa0/0.20 192.168.22.1 255.255.255.128 0.0.0.127 Fa0/0.30 192.168.22.129 255.255.255.128 0.0.0.127 S0/0/0 192.168.23.130 255.255.255.252 0.0.0.3 S0/0/1 192.168.23.137 255.255.255.252 0.0.0.3 India Fa0/0.20 192.168.23.1 255.255.255.192 0.0.0.63 Fa0/0.30 192.168.23.65 255.255.255.192 0.0.0.63 S0/0/0 192.168.23.133 255.255.255.252 0.0.0.3 S0/0/1 192.168.23.138 255.255.255.252 0.0.0.3 PC01 N.I.C DHCP 255.255.255.0 PC02 N.I.C DHCP 255.255.255.0 PC03 N.I.C DHCP 255.255.255.128 PC04 N.I.C DHCP 255.255.255.128 PC05 N.I.C 192.168.23.67 255.255.255.192 PC06 N.I.C 192.168.23.2 255.255.255.192 VLAN CONFIGURATION DEVICE INTERFACE VLAN NO. Switch 1 Fa0/2 30 Switch 1 Fa0/3 20 Switch 2 Fa0/1 30 Switch 2 Fa0/2 30 Switch 3 Fa0/2 20 Switch 3 Fa0/3 30 Switch 4 Fa0/1 20 Switch 4 Fa0/2 20 Switch 5 Fa0/2 20 Switch 5 Fa0/3 30 Switch 6 Fa0/1 20 Switch 6 Fa0/2 20 ROUTER CONFIGURATION Network topology was created using Cisco packet tracer environment. This network comprises of UK, Brazil and India routers interconnected using WAN links. Protocol used in this configuration is OSPFv2. All connected networks were advertised except the loopback interface, this was done to ensure communication throughout the network using OSPFv2. Default route was configured on the UK router as a static route which was distributed through OSPF to Brazil and India. UK is connected to the Brazil router via S0/0/0 and S0/0/0 ports of both routers. UK is connected to the India router via S0/0/1 and S0/0/0 ports of both routers. Brazil is connected to the India router via S0/0/1 and S0/0/1 ports of both routers. UK subnets are connecting via Fa0/0.20 and Fa0/030 subinterfaces to the UK router. Brazil subnets are connected via Fa0/0.20 and Fa0/.30 subinterfaces on the Brazil router. Indian subnets are connected through Fa0/0.20 and Fa0/0.30 subinterfaces on the India router. Due the router were not configured with password be OSPF was configured. OSPF MD5 authentication key was set to “packet” for all three routers. This was done for security purpose. To prevent unauthorized up set of router configuration. Configuration of OSPFv2 on the three router forms an autonomous systems. UK ROUTER CONFIGURATION: UK#sh running-config Building configuration... Current configuration : 1453 bytes ! version 12.4 no service timestamps log datetime msec no service timestamps debug datetime msec no service password-encryption ! hostname UK ! ! ! ! ip dhcp excluded-address 192.168.20.1 ip dhcp excluded-address 192.168.21.1 ! ip dhcp pool vlan20 network 192.168.20.0 255.255.255.0 default-router 192.168.20.1 ip dhcp pool vlan30 network 192.168.21.0 255.255.255.0 default-router 192.168.21.1 ! ip cef no ipv6 cef ! ! ! ! ! ! ! ! ! ! ! ! spanning-tree mode pvst ! ! ! ! ! ! interface FastEthernet0/0 description "Trunk with Switch" no ip address duplex auto speed auto ! interface FastEthernet0/0.20 encapsulation dot1Q 20 ip address 192.168.20.1 255.255.255.0 ! interface FastEthernet0/0.30 encapsulation dot1Q 30 ip address 192.168.21.1 255.255.255.0 ! interface FastEthernet0/1 no ip address duplex auto speed auto shutdown ! interface Serial0/0/0 bandwidth 2048 ip address 192.168.23.129 255.255.255.252 clock rate 2000000 ! interface Serial0/0/1 bandwidth 2048 ip address 192.168.23.133 255.255.255.252 clock rate 2000000 ! interface Vlan1 no ip address shutdown ! router ospf 1 log-adjacency-changes network 192.168.23.128 0.0.0.3 area 0 network 192.168.23.132 0.0.0.3 area 0 network 192.168.20.0 0.0.1.255 area 0 network 192.168.20.0 0.0.0.255 area 0 network 192.168.21.0 0.0.0.255 area 0 ! ip classless ! ip flow-export version 9 ! ! ! no cdp run ! ! ! ! ! line con 0 ! line aux 0 ! line vty 0 4 login ! ! ! End BRAZIL ROUTER CONFIGURATION: BRAZIL#sh running-config Building configuration... Current configuration : 1441 bytes ! version 12.4 no service timestamps log datetime msec no service timestamps debug datetime msec no service password-encryption ! hostname BRAZIL ! ! ! ! ip dhcp excluded-address 192.168.22.1 ip dhcp excluded-address 192.168.22.129 ! ip dhcp pool vlan20 network 192.168.22.128 255.255.255.128 default-router 192.168.22.129 ip dhcp pool vlan30 network 192.168.22.0 255.255.255.128 default-router 192.168.22.1 ! ip cef no ipv6 cef ! ! ! ! ! ! ! ! ! ! ! ! spanning-tree mode pvst ! ! ! ! ! ! interface FastEthernet0/0 no ip address duplex auto speed auto ! interface FastEthernet0/0.20 encapsulation dot1Q 20 ip address 192.168.22.1 255.255.255.128 ! interface FastEthernet0/0.30 encapsulation dot1Q 30 ip address 192.168.22.129 255.255.255.128 ! interface FastEthernet0/1 no ip address duplex auto speed auto shutdown ! interface Serial0/0/0 bandwidth 2048 ip address 192.168.23.130 255.255.255.252 clock rate 2000000 ! interface Serial0/0/1 bandwidth 256 ip address 192.168.23.137 255.255.255.252 clock rate 2000000 ! interface Vlan1 no ip address shutdown ! router ospf 1 log-adjacency-changes network 192.168.23.128 0.0.0.3 area 0 network 192.168.23.136 0.0.0.3 area 0 network 192.168.22.0 0.0.0.255 area 0 network 192.168.22.0 0.0.0.127 area 0 network 192.168.22.128 0.0.0.127 area 0 ! ip classless ! ip flow-export version 9 ! ! ! no cdp run ! ! ! ! ! line con 0 ! line aux 0 ! line vty 0 4 login ! ! ! End INDIA ROUTER CONFIGURATION: INDIA#sh running-config Building configuration... Current configuration : 1180 bytes ! version 12.4 no service timestamps log datetime msec no service timestamps debug datetime msec no service password-encryption ! hostname INDIA ! ! ! ! ! ! ip cef no ipv6 cef ! ! ! ! ! ! ! ! ! ! ! ! spanning-tree mode pvst ! ! ! ! ! ! interface FastEthernet0/0 no ip address duplex auto speed auto ! interface FastEthernet0/0.20 encapsulation dot1Q 20 ip address 192.168.23.1 255.255.255.192 ! interface FastEthernet0/0.30 encapsulation dot1Q 30 ip address 192.168.23.65 255.255.255.192 ! interface FastEthernet0/1 no ip address duplex auto speed auto shutdown ! interface Serial0/0/0 bandwidth 2048 ip address 192.168.23.134 255.255.255.252 clock rate 2000000 ! interface Serial0/0/1 bandwidth 256 ip address 192.168.23.138 255.255.255.252 clock rate 2000000 ! interface Vlan1 no ip address shutdown ! router ospf 1 log-adjacency-changes network 192.168.23.132 0.0.0.3 area 0 network 192.168.23.136 0.0.0.3 area 0 network 192.168.23.0 0.0.0.127 area 0 network 192.168.23.0 0.0.0.63 area 0 network 192.168.23.64 0.0.0.63 area 0 ! ip classless ! ip flow-export version 9 ! ! ! no cdp run ! ! ! ! ! line con 0 ! line aux 0 ! line vty 0 4 login ! ! ! end SWITCH S1 CONFIGURATION: s1#sh running-config Building configuration... Current configuration : 1188 bytes ! version 12.2 no service timestamps log datetime msec no service timestamps debug datetime msec no service password-encryption ! hostname s1 ! ! ! ! ! spanning-tree mode pvst ! interface FastEthernet0/1 switchport mode trunk ! interface FastEthernet0/2 switchport access vlan 30 switchport mode access ! interface FastEthernet0/3 switchport access vlan 20 switchport mode access spanning-tree portfast ! interface FastEthernet0/4 ! interface FastEthernet0/5 ! interface FastEthernet0/6 ! interface FastEthernet0/7 ! interface FastEthernet0/8 ! interface FastEthernet0/9 ! interface FastEthernet0/10 ! interface FastEthernet0/11 ! interface FastEthernet0/12 ! interface FastEthernet0/13 ! interface FastEthernet0/14 ! interface FastEthernet0/15 ! interface FastEthernet0/16 ! interface FastEthernet0/17 ! interface FastEthernet0/18 ! interface FastEthernet0/19 ! interface FastEthernet0/20 ! interface FastEthernet0/21 ! interface FastEthernet0/22 ! interface FastEthernet0/23 ! interface FastEthernet0/24 ! interface GigabitEthernet0/1 ! interface GigabitEthernet0/2 ! interface Vlan1 no ip address shutdown ! ! ! ! line con 0 ! line vty 0 4 login line vty 5 15 login ! ! End SWITCH S2 CONFIGURATION: s2#SH Running-config Building configuration... Current configuration : 1165 bytes ! version 12.2 no service timestamps log datetime msec no service timestamps debug datetime msec no service password-encryption ! hostname s2 ! ! ! ! ! spanning-tree mode pvst ! interface FastEthernet0/1 switchport access vlan 30 switchport mode access ! interface FastEthernet0/2 switchport access vlan 30 s2# s2# s2# s2#SH Running-config Building configuration... Current configuration : 1165 bytes ! version 12.2 no service timestamps log datetime msec no service timestamps debug datetime msec no service password-encryption ! hostname s2 ! ! ! ! ! spanning-tree mode pvst ! interface FastEthernet0/1 switchport access vlan 30 switchport mode access ! interface FastEthernet0/2 switchport access vlan 30 switchport mode access spanning-tree portfast ! interface FastEthernet0/3 ! interface FastEthernet0/4 ! interface FastEthernet0/5 ! interface FastEthernet0/6 ! interface FastEthernet0/7 ! interface FastEthernet0/8 ! interface FastEthernet0/9 ! interface FastEthernet0/10 ! interface FastEthernet0/11 ! interface FastEthernet0/12 ! interface FastEthernet0/13 ! interface FastEthernet0/14 ! interface FastEthernet0/15 ! interface FastEthernet0/16 ! interface FastEthernet0/17 ! interface FastEthernet0/18 ! interface FastEthernet0/19 ! interface FastEthernet0/20 ! interface FastEthernet0/21 ! interface FastEthernet0/22 ! interface FastEthernet0/23 ! interface FastEthernet0/24 ! interface GigabitEthernet0/1 ! interface GigabitEthernet0/2 ! interface Vlan1 no ip address shutdown ! ! ! ! line con 0 ! line vty 0 4 login line vty 5 15 login ! ! End SWITCH S3 CONFIGURATION: s3#SHow Running-config Building configuration... Current configuration : 1212 bytes ! version 12.2 no service timestamps log datetime msec no service timestamps debug datetime msec no service password-encryption ! hostname s3 ! ! ! ! ! spanning-tree mode pvst ! interface FastEthernet0/1 switchport mode trunk ! interface FastEthernet0/2 switchport access vlan 20 switchport mode access spanning-tree portfast ! interface FastEthernet0/3 switchport access vlan 30 switchport mode access spanning-tree portfast ! interface FastEthernet0/4 ! interface FastEthernet0/5 ! interface FastEthernet0/6 ! interface FastEthernet0/7 ! interface FastEthernet0/8 ! interface FastEthernet0/9 ! interface FastEthernet0/10 ! interface FastEthernet0/11 ! interface FastEthernet0/12 ! interface FastEthernet0/13 ! interface FastEthernet0/14 ! interface FastEthernet0/15 ! interface FastEthernet0/16 ! interface FastEthernet0/17 ! interface FastEthernet0/18 ! interface FastEthernet0/19 ! interface FastEthernet0/20 ! interface FastEthernet0/21 ! interface FastEthernet0/22 ! interface FastEthernet0/23 ! interface FastEthernet0/24 ! interface GigabitEthernet0/1 ! interface GigabitEthernet0/2 ! interface Vlan1 no ip address shutdown ! ! ! ! line con 0 ! line vty 0 4 login line vty 5 15 login ! ! End SWITCH S4 CONFIGURATION: s4#SH Running-config Building configuration... Current configuration : 1189 bytes ! version 12.2 no service timestamps log datetime msec no service timestamps debug datetime msec no service password-encryption ! hostname s4 ! ! ! ! ! spanning-tree mode pvst ! interface FastEthernet0/1 switchport access vlan 20 switchport mode access spanning-tree portfast ! interface FastEthernet0/2 switchport access vlan 20 switchport mode access spanning-tree portfast ! interface FastEthernet0/3 ! interface FastEthernet0/4 ! interface FastEthernet0/5 ! interface FastEthernet0/6 ! interface FastEthernet0/7 ! interface FastEthernet0/8 ! interface FastEthernet0/9 ! interface FastEthernet0/10 ! interface FastEthernet0/11 ! interface FastEthernet0/12 ! interface FastEthernet0/13 ! interface FastEthernet0/14 ! interface FastEthernet0/15 ! interface FastEthernet0/16 ! interface FastEthernet0/17 ! interface FastEthernet0/18 ! interface FastEthernet0/19 ! interface FastEthernet0/20 ! interface FastEthernet0/21 ! interface FastEthernet0/22 ! interface FastEthernet0/23 ! interface FastEthernet0/24 ! interface GigabitEthernet0/1 ! interface GigabitEthernet0/2 ! interface Vlan1 no ip address shutdown ! ! ! ! line con 0 ! line vty 0 4 login line vty 5 15 login ! ! End SWITCH S5 CONFIGURATION: s5#SH RUnning-config Building configuration... Current configuration : 1212 bytes ! version 12.2 no service timestamps log datetime msec no service timestamps debug datetime msec no service password-encryption ! hostname s5 ! ! ! ! ! spanning-tree mode pvst ! interface FastEthernet0/1 switchport mode trunk ! interface FastEthernet0/2 switchport access vlan 20 switchport mode access spanning-tree portfast ! interface FastEthernet0/3 switchport access vlan 30 switchport mode access spanning-tree portfast ! interface FastEthernet0/4 ! interface FastEthernet0/5 ! interface FastEthernet0/6 ! interface FastEthernet0/7 ! interface FastEthernet0/8 ! interface FastEthernet0/9 ! interface FastEthernet0/10 ! interface FastEthernet0/11 ! interface FastEthernet0/12 ! interface FastEthernet0/13 ! interface FastEthernet0/14 ! interface FastEthernet0/15 ! interface FastEthernet0/16 ! interface FastEthernet0/17 ! interface FastEthernet0/18 ! interface FastEthernet0/19 ! interface FastEthernet0/20 ! interface FastEthernet0/21 ! interface FastEthernet0/22 ! interface FastEthernet0/23 ! interface FastEthernet0/24 ! interface GigabitEthernet0/1 ! interface GigabitEthernet0/2 ! interface Vlan1 no ip address shutdown ! ! ! ! line con 0 ! line vty 0 4 login line vty 5 15 login ! ! End SWITCH S6 CONFIGURATION: s6#SH Running-config Building configuration... Current configuration : 1189 bytes ! version 12.2 no service timestamps log datetime msec no service timestamps debug datetime msec no service password-encryption ! hostname s6 ! ! ! ! ! spanning-tree mode pvst ! interface FastEthernet0/1 switchport access vlan 20 switchport mode access spanning-tree portfast ! interface FastEthernet0/2 switchport access vlan 20 switchport mode access spanning-tree portfast ! interface FastEthernet0/3 ! interface FastEthernet0/4 ! interface FastEthernet0/5 ! interface FastEthernet0/6 ! interface FastEthernet0/7 ! interface FastEthernet0/8 ! interface FastEthernet0/9 ! interface FastEthernet0/10 ! interface FastEthernet0/11 ! interface FastEthernet0/12 ! interface FastEthernet0/13 ! interface FastEthernet0/14 ! interface FastEthernet0/15 ! interface FastEthernet0/16 ! interface FastEthernet0/17 ! interface FastEthernet0/18 ! interface FastEthernet0/19 ! interface FastEthernet0/20 ! interface FastEthernet0/21 ! interface FastEthernet0/22 ! interface FastEthernet0/23 ! interface FastEthernet0/24 ! interface GigabitEthernet0/1 ! interface GigabitEthernet0/2 ! interface Vlan1 no ip address shutdown ! ! ! ! line con 0 ! line vty 0 4 login line vty 5 15 login ! ! end Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Network Report and Configuration Example | Topics and Well Written Essays - 3250 words, n.d.)
Network Report and Configuration Example | Topics and Well Written Essays - 3250 words. https://studentshare.org/information-technology/1850245-network-report-and-configuration
(Network Report and Configuration Example | Topics and Well Written Essays - 3250 Words)
Network Report and Configuration Example | Topics and Well Written Essays - 3250 Words. https://studentshare.org/information-technology/1850245-network-report-and-configuration.
“Network Report and Configuration Example | Topics and Well Written Essays - 3250 Words”. https://studentshare.org/information-technology/1850245-network-report-and-configuration.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Report and Configuration

TCP/IP Security Threats and Attack Methods

Now the TCP/IP model which was created in 1970 by Defense Advanced Research Projects Agency (DARPA) an agency of the United states department of defense, provides some basic guidelines and utilization of network protocols which make computers able to use a network for their communication.... Link Layer According to Stevens (1) the Link Layer is known by various other names, including Data-Link Layer as well as network interface Layer.... The device driver in an operating system as well as the network interface card which has been inserted for it into the computer, all come under the link layer (Stevens, 1)....
20 Pages (5000 words) Report

Network Environment Management

These tools provides incomplete and limited outlook of the network and the management necessities.... This report ''network Environment Management'' will provide a proposed solution that will incorporate network architecture.... nbsp;… My incorporating UMTS solution, the sales team is able to connect to the organization's Virtual network by passing a security check.... Moreover, for different type of users on the network including managing directors, Managers, Engineers, Finance staff, Sales staff and secretaries, different type of access is required....
20 Pages (5000 words) Report

Internet Protocol Version 4 and It Next Generation IP

Furthermore, in large and complex computer network environments, automated IP configuration reduces administration and configuration.... Moreover, other issues such as performance, security and auto configuration are considered secondary (Loshin 305).... nbsp;The protocol operates the network layer that is a third layer of the Open System Interconnection (OSI) model.... nbsp; The protocol operates the network layer that is a third layer of the Open System Interconnection (OSI) model....
14 Pages (3500 words) Report

Internet Protocol Security (IPsec)

nbsp;… Internet is a public network which was not created with the aspect of security in mind.... This report  ''Internet Protocol Security (IPsec)'' presents an overview of the IPSec technology.... It discusses the general architecture of the technology, briefly covering its technical details and its operation modes....
11 Pages (2750 words) Report

School of Computing

hellip; EEC has to address many challenges in order to secure the information residing on the network assets i.... We will address identified security threats to the current network by categorizing them into two categories: External Threats: Virus, Trojan, Worms, Spyware, Cyber-attack, Denial of Service Attack, Distributed Denial of Service Attack Residual Threats: Vulnerabilities within the RADIUS server....
12 Pages (3000 words) Report

Computer Communications and Networks

The Internet layer is associated with Internet Protocol (IP), Address Resolution Protocol (ARP), Internet Control Message Protocol (ICMP) and lastly, the data link layer that is also called the network interface layer is associated with Ethernet, token ring etc.... The network access layer than links the transmission to the required segment from the same layer as shown in Figure 1....
8 Pages (2000 words) Report

Intrusion Detection and Prevention Systems

The first finding is that switches and routers are some of the safest devices that are used to connect two different networks or different parts of a network.... network switches and routers Main features and functions: Switch is a device used for the purposes of telecommunication that connects various network parts of a network to each other or connects a particular device to the network.... The switch creates a different collision domain for every port on the network by working at the data link layer of the OSI model....
8 Pages (2000 words) Report

Implementation Using LAN and WAN Devices in a Topology

configuration of routing protocol on all the three sites must be as per the requirement advertisement of routes to all directly connected networks except the loopback interface attached to London HQ.... In this network design topology, three routers are interconnected logically and, further, each router is directly connected with two more networks.... OSPF routing protocol is to be configured within the given logical network.... nbsp; Link-state routing constantly tries to keep complete network topology by updating its routing table whenever the status of any link is changed in the network....
10 Pages (2500 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us