MITS4004 IT Networking and Communication Report Sample

This assessment item relates to the unit learning outcomes as in the unit descriptors.

This assessment covers the following Learning Outcomes:

L01: Identify the operation of the protocols that are used inside the Internet and use the seven?layer model to classify networking topology, protocol, and security needs.

LO2: Evaluate LAN technology issues, including routing and flow control. Explain the difference between switches and routers. Build and troubleshoot Ethernet, Wi-Fi, and Leased line networks. Connect networks with routers.

LO4: Apply the advanced knowledge gained to reflect on the security requirements of a network. Evaluate the issues that surround network applications such as quality of service (QoS) and network performance analysis. Be adaptable to changing requirements.

Case Study:

Your group is hired as a consultancy firm to set up a small private day-patient hospital network technology. The hospital has one building, 5 floors, Basement dedicated to secure car parking, Level 1 consists of a reception and a waiting room, Level 2 and 3 consistent of 2 operating theaters, 4 post-operative recovery rooms, Level 5 is the management, financial offices and the staff room. Patients can access Wifi and there is an internal website – one page explaining how to get on to the network.

Staffing is as follows: 4 Management, 3 financial officers and 5 nurses and 3 doctors.

The nurses and doctors share 4 phones per each floor on Level 2 and Level 3. Management staff and financial officers have a phone each. In Packet Tracker:

Construct the appropriate network technologies.

Separate Level 2 and 3 from other offices using VLANs.
Separate VoIP phones on VLAN 0.
Setup appropriate subnet
Config the wireless LAN.
Setup a WebSever for the website
Setup a DHCP server and a DNS server.
Enable routers to connect to each other.
Setup a STP.

Appropriate label your network diagram with annotation and background image.

Generate appropriate network traffic.

Show QoS (e.g. show policy-map interface serial 0/0/0) before and after simulation.

Throughout this assessment you may find the following CISCO packet tracer sample labs useful.
(File-> Open Samples) Wireless LAN, DHCP, Wireless, DNS, HTTPS, Wireless LAN Security Remember to view the configuration of a CISCO box use the following command; enable, show run

Solution

Introduction

This report is aim to create a network design for the hospital by using the cisco packet tracer. They want to implement a secure network into their hospital and so they want to first create demo in the cisco tool. Added to the physical arrangement, the scenario describes the staffing organisation, which consists of four management staff members, three finance officers, five nurses, as well as three physicians. University Assignment Help, The necessities for communication are listed, with management and finance executives having their own telephone and doctors and nurses on Levels 2 and 3 sharing four phones per level. A customized strategy for networking solutions must be adopted because of the levels of complexity this intricate configuration brings. This will be help in understanding the performance of the network.

Network subnets

A Class C private IP address range is used into the network and it is represented by the IP address 192.168.10.1/24, where the "/24" stands for the subnet mask [5]. Eight bits are left behind in a "/24" subnet for host addresses within the network, with the first 24 bits being used for the network component. It's possible to dissect an IP address to find the network and host portions:

Subnet Mask: /24 IP Address: 192.168.10.1
Decomposing the IP address into binary code:
IP Address: 11000000.10101000.00001010.00000001
Subnet Mask: 11111111.11111111.11111111.00000000
Subnet of the network
Department 1-managmenet:
Subnet ID: 192.168.10.0/27
Broadcast Address: 192.168.10.31
Network Address: 192.168.10.0
Default Gateway: 192.168.10.1
Host Range: 192.168.10.1 to 192.168.10.30
Department 2 – financial
Subnet ID: 192.168.10.32/27
Broadcast Address: 192.168.10.63
Network Address: 192.168.10.32
Default Gateway: 192.168.10.33
Host Range: 192.168.10.33 to 192.168.10.62
Department 3: Nurse:
Subnet ID: 192.168.10.64/27
Broadcast Address: 192.168.10.95
Network Address: 192.168.10.64
Default Gateway: e.g., 192.168.10.65
Host Range: 192.168.10.65 to 192.168.10.94
Department 4: Doctor:
Subnet ID: 192.168.10.96/27
Broadcast Address: 192.168.10.127
Network Address: 192.168.10.96
Default Gateway: 192.168.10.97
Host Range: 192.168.10.97 to 192.168.10.126
Department 5: Server:
Subnet ID: 192.168.10.96/27
Broadcast Address: 192.168.10.127
Network Address: 192.168.10.96
Default Gateway: 192.168.10.97
Host Range: 192.168.10.97 to 192.168.10.126

Network Topology:

Combining two or more distinct network topologies results in a hybrid network topology. It is intended to make advantage of the benefits of different topologies in order to meet expected operating or organizational needs. Often, the objective is to establish a more adaptable and resilient network that overcomes the shortcomings of specific topologies. An outline of the essential elements as well as traits of a hybrid network topology is offered.

A hybrid network architecture provides a calculated approach to creating networks that meet certain organizations' demands. It balances many topologies, utilizing each one's advantages to build a more adaptable and durable network architecture [4].

Security measures:

A crucial component of information technology management is security of networks, which guarantees the confidentiality, availability, and authenticity of data.

Firewall: With the help of pre-established security rules, firewalls closely track and control all incoming and outgoing network traffic, serving as a barrier between trusted internal networks as well as untrusted external networks. Although software firewalls can be put on devices themselves, hardware firewalls are typically implemented at the network perimeter.

ACLs, or access control lists, are used to regulate traffic on networks by setting rules that allow or forbid on protocols, ports, the origin and destination IP addresses, as well as other factors. Configured to manage traffic at different network nodes on routers, switches, as well as firewalls. Combining these security measures leads to a layered defines approach that increases the difficulty of network penetration by attackers. Another essential element of a strong network security posture is conducting regular security assessments as well as keeping up with new threats.

Network design

OSI models:

A theoretical framework known as the Open Systems Interconnection (OSI) model divides the inner workings of a computer or system of communications into seven abstract layers, every one of whose functions serves a distinct purpose in promoting communication among devices. The structure of the model goes via the following layers: data link, network, transport, session, presentation, as well as application. The physical layer deals with equipment connections as well as electrical impulses [2].

The sending and receiving of raw data bits via physical media is the responsibility of the physical layer, which is the most basic.

By managing segmentation, flow management, as well as error recovery, the transport layer guarantees end-to-end communication.

The application layer, which is the highest layer, acts as a direct conduit between users as well as the network, giving apps access to network services. The OSI model's layers cooperate with one another while yet functioning independently to allow seamless transmission of information across networks [1].

Figure 1: OSI model

Networking terminology

Simulation Traffic:

Command line tools:

Multilayer switch

Trunk mode:


 
Router configuration:

Conclusion

This report aim was creating a network design in the packet tracer and outlining the important aspects of the security and that is done properly in the above report. The OSI model is a fundamental resource for comprehending network communication protocols as well as architectures because of its modular design, which promotes flexibility as well as interoperability in a range of network situations. Network configuration with all proper working added.

References:

[1] “What is OSI Model | 7 Layers Explained | Imperva,” Learning Center, Mar. 16, 2023. https://www.imperva.com/learn/application-security/osi-model/ (accessed Nov. 24, 2023).

[2] “What is the OSI Model?,” Cloudflare, 2023. https://www.cloudflare.com/en-gb/learning/ddos/glossary/open-systems-interconnection-model-osi/ (accessed Nov. 24, 2023).

[3] “Network Redundancy Protocols | Antaira Technologies,” Antaira.com, 2022. https://www.antaira.com/Whitepaper-Network-Redundancy-Protocols (accessed Nov. 24, 2023).

[4] “What is Subnet Mask? Definition & FAQs | Avi Networks,” Avi Networks, Dec. 2022. https://avinetworks.com/glossary/subnet-mask/ (accessed Nov. 24, 2023).

[5]“Understanding the Role of Subnetting in Computer Networks,” Spiceworks, Nov. 03, 2022. https://www.spiceworks.com/tech/networking/articles/what-is-subnet-mask/ (accessed Nov. 24, 2023).

Would you like to schedule a callback?
Send us a message and we will get back to you

Highlights

Earn While You Learn With Us
Confidentiality Agreement
Money Back Guarantee
Live Expert Sessions
550+ Ph.D Experts
21 Step Quality Check
100% Quality
24*7 Live Help
On Time Delivery
Plagiarism-Free

Uni Assignment Help
A+ Grade Assured

Assignment Support
Hello!
Struggling with your assignments? Get 30% OFF on your first order.

Chat with experts now!
×
Get Instant Help
University Assignment Help

Still Finding University Assignment Help? You’ve Come To The Right Place!


CAPTCHA
AU ADDRESS
81 Isla Avenue Glenroy, Mel, VIC, 3046 AU
CONTACT