Uploaded by monicaberbece

Unit 2- Networking 2

advertisement
ASSIGNMENT 2- DESIGN
AND IMPLEMENT A
NETWORK
INFRASTRUCTURE
UNIT 2 NETWORKING
JANUARY 22, 2021
Table of Contents
Table of figures ....................................................................................................................................... 1
Introduction ............................................................................................................................................ 2
Test and evaluate the design ................................................................................................................. 2
Test and evaluate the networked system ............................................................................................. 3
Document and analyse test results ....................................................................................................... 9
Recommend potential enhancements for the networked system. ................................................... 17
Design a maintenance schedule to support the networked system .................................................. 19
Use critical reflection to evaluate own work and justify valid conclusions. ...................................... 21
Bibliography.......................................................................................................................................... 23
Table of figures
Figure 1 Second floor .............................................................................................................................. 3
Figure 2 First floor ................................................................................................................................... 3
Figure 3 DHCP address ............................................................................................................................ 4
Figure 4 Laptop are connected wireless ................................................................................................. 4
Figure 5 Wireless password .................................................................................................................... 5
Figure 6 Laptop is connected to the network ......................................................................................... 5
Figure 7 Command Prompt ..................................................................................................................... 6
Figure 8 Command ping on Command Prompt ...................................................................................... 6
Figure 9 Command tracert on Command Prompt .................................................................................. 7
Figure 10 Command netstat in Command Prompt ................................................................................. 8
Figure 11 Messages are sent successfully............................................................................................... 8
Figure 12 Virtual Machine is running ...................................................................................................... 9
Figure 13 The Domain was created ...................................................................................................... 10
Figure 14 DNS is created ....................................................................................................................... 10
Figure 15 IP address of PC's DNS .......................................................................................................... 11
Figure 16 Contents of DHCP .................................................................................................................. 11
Figure 17 Start and end IP addresses.................................................................................................... 12
Figure 18 IP address for the other computer ....................................................................................... 12
Figure 19 First Machine authentication ................................................................................................ 13
Figure 20 Server's IP address ................................................................................................................ 13
Figure 21 The two machines are connected ......................................................................................... 14
Figure 22 Command Prompt ................................................................................................................. 14
Figure 23 Command ping ...................................................................................................................... 15
Figure 24 IIS installed on server ............................................................................................................ 15
Figure 25 Domain Controller................................................................................................................. 16
Figure 26 DHSP, DNS, IIS are installed .................................................................................................. 16
Introduction
Macron Investments Ltd. have their office in a 2-storey building which is completely
occupied by the investment company. The company requires a server-client network
infrastructure that is centrally managed. They want 60 desktop PCs installed and Wi-Fi
connectivity configured. The company is planning to expand its employee base to 60member staff across the three floors of the 2-storey building. 55 of the employees will have
fixed workstations and 5 of them will use hot desks with Wi-Fi enabled laptop devices. Each
floor of the building will have 2 networked printers with scanning features, switchers,
server. The connection to external networks will be made with the help of a router and a
server, and this increases the security of this network.
Test and evaluate the design
In my design I used the tree topology to combine the features of the bus and star
topologies. The nodes are grouped into several star topologies, which in turn are connected
to a central cable. The tree topology has the disadvantage of limiting the maximum length
of a segment. In addition, if there are problems with the main connection, all computers in
that segment are affected. The advantage of the tree topology is that the individual
segments have direct links.
As the company is quite large and growing, I preferred to use two IP addresses
(198.162.1.1; 192.168.1.1), in this way there will be no problems in the future, all the
computers have DHCP configuration and each floor has wireless device connection via a
secured Wi-Fi authentication. PCs are connected to switches using FastEthernet ports that
means 100Mbps numbering from Fa0/0 to Fa0/24, but switch and router are connected
using GigagitEthernet ports which means 1000 Mbps, numbering Gig0/0 to Gig 0/2
Test and evaluate the networked system
Figure 1 Second floor
Here we have the design for second floor with the router and server which is connecting
our network with externals networks.
Figure 2 First floor
This picture shows the design of first floor and the green arrows prove that ports are
working fine.
Figure 3 DHCP address
This picture demonstrate that the PCs are using a DHCP address, configurated
automatically.
Figure 4 Laptop are connected wireless
Laptops are connected to a wireless access point which required a password for
authentication, as we can see in following picture. The passwords are different on each
floor.
Figure 5 Wireless password
Wireless password for first floor.
Figure 6 Laptop is connected to the network
Figure 7 Command Prompt
Here we can see that servers communicate each other.
Figure 8 Command ping on Command Prompt
In this picture we can see that server communicate with one of the PC and we cand see
that we sent 4 packets and we received all 4 back. But all the network functions are good,
every device communicate with each other.
Figure 9 Command tracert on Command Prompt
We can use another command named traceroute to check the connectivity and this
command is giving us the exact path that packet took to get from source to the destination
and is showing the list of address that it used. The command ping is just telling us that is no
connectivity and is not telling us what the problem is, but traceroute is telling us where is
wrong, what router is down or is not working.
Figure 10 Command netstat in Command Prompt
In Cisco Packet Tracer the usage of netstat command is limited but using the parameter -r
we can get details about router, interfaces and active links.
Figure 11 Messages are sent successfully
Successfully sent messages. Messages are not always sent from the first attempt,
sometimes on the second attempt, after the green arrows flash once, the messages are
transmitted successfully.
Document and analyse test results
Using Virtual Machine (VirtualBox), we created a LAN network which include one server
and one workshop.
Figure 12 Virtual Machine is running
The Virtual Machine is running, PC is configured.
Figure 13 The Domain was created
The Domain of our PC was created with Active Directory.
Figure 14 DNS is created
DNS created within DNS manager and DNS scope.
Figure 15 IP address of PC's DNS
IP address of my DNS server
Figure 16 Contents of DHCP
Figure 17 Start and end IP addresses
DHCP Manager, IP address starts with 192.168.0.103 and ends with 192.168.0.199.
Figure 18 IP address for the other computer
IP address for the other computer which is due to expire on 19th January 2021.
Figure 19 First Machine authentication
The first Machine ask authentication.
Figure 20 Server's IP address
IP address from the server.
Figure 21 The two machines are connected
Macron1 shows that the two machines are connected. This PC is part of the Domain
which is successfully connected to the server and it can communicate with the server.
Figure 22 Command Prompt
Command Prompt
Figure 23 Command ping
This is a test table to check that both PCs are connected.
Figure 24 IIS installed on server
This picture is a proof that IIS is installed on the server.
Figure 25 Domain Controller
This picture is on this PC to show that the Domain Controller is working.
Figure 26 DHSP, DNS, IIS are installed
This picture shows that DHCP, DNS, IIS are installed on server.
Recommend potential enhancements for the networked system.
When is creating a network system often our network can start to run slow, we take the
blame of the network itself and usually the components are the last thing considered, but
there are various ways that can improve network performance. In the past the idea of a
network for the people was a work group LAN, it either worked or it did not and most of the
times we blame a crashed server or a disconnected co-axial cable.
In the present there are more complex enterprises networks with more potential sources
of failure or degradation and different traffic types competing for poor resources. There are
several ways to improve network performance starting with the need to replace or upgrade
the infrastructure, but you also need to understand the network. According to Withers, S.,
(10th February 2005), “without having an understanding of what's actually happening on
your network, you are likely to fail at any attempt to address performance issues”. This
means there is not the certain that the network is the problem, but IT loose time to prove is
not.
It is also recommended to use the backup to reset the system in the event of any loss
event data or damage to critical files needed to run operating system (contacting a virus or
even accidental deletion of some files), you will quickly restart the OS, however the
applications you had installed and the documents personal and this should be done daily or
periodically.
It is advisable to always update the system to have the latest versions of the programs
used, which will guarantee a better and error-free operation and to discover if there is a
problem.
Online security is a reality of the modern world that must not be ignored, and an
antivirus will protect your computer from viruses, phishing attempts, malware, ransomware
and computer dangers. An antivirus program has the role of scanning, detecting and
removing computer viruses and other harmful programs.
Withers, S., (10th February 2005) says, "the first thing to do is make sure the network
really is the problem", can be use some tools as for example Compuware's Vantage suite,
useful to isolate problems, like this there is the possibility to identify problems (slow client,
excessive latency on a WAN link, poor wright SQL on the back end server. To develop an
application, we need to use a LAN deployed over a one with the problem about excessive
number of data base calls with the consequence of disappointed results. This analysis can
reveal a slowly one link, for example.
By collecting the right information is possible to identify and to deal with problems
before they impact on users. The tendence can be that to add bandwidth to resolve the
problems. Withers, S., (10th February 2005) says, "you've got to have facts -- applicationbased facts". Can happened that can be something that improve performance in one
environment but could hinder performance in another.
There is free chip, expensive tools that single or combined help us understand what is
happening and why (Multi Router Traffic Grapher). Network analysers show the aggregate
traffic, without information we need, and it is important to understand that the application
is strong and then check the infrastructure and its aspects. This kind of monitoring can come
with alerting and if the monitor is tuned to avoid false positives the right persons will be
alerted in automatic when and unusual event happened, but if we speak about radio
frequency to have a good wireless LAN performance, monitor is vital because “the RF
environment is not static”, says Withers, S., (10th February 2005).
Network can be increase with the implementation of VPN that have as advantage by
using it that we can access remote the information for any place, and this increase the
productivity. Configuration of VPN server must be use in network system because VPN use
powerful encryption protocols made to protect online data while we browse in the web and
give the security to internet traffic.
If we use firewall the unnecessary network traffic will be filtered, and this will provide
security to network system which blocks incoming and outgoing traffic and in the same time
firewall block the malicious programs or websites and let pass the true and real programs
through network. In conclusion, firewalls are important to protect computers (files, data,
programs), from e-mails, websites malicious programs. But as there is no perfect security, a
firewall is not enough to secure the network, but it is an important component that helps
secure external access. It is important to monitor the traffic, the pattern of the traffic to find
if there is a problem.
By using server technology in a network, we provide a service to a client, servers have
more processing power, memory, storage then the client computer and provide remote
accessibility, centralised backup, facility, reliability and security. Servers support numerous
applications, multiple user’s access, in a single server we can find a lot of virtual machines
and the performance will not be compromised. Is better to use a server to improve network
system.
If instead of hub we will use router, switch, it will move packet faster than the hub
because everything switch and router does are in hardware and sends the data to actual
destination and they are more secure than the hub that can be maintain. Switches and
routers can be used in LAN, MAN, WAN, but hubs can be used only in LAN and is better to
use routers and switches.
With the help of Internet Protocol addresses identify a network, allows bigger network to
be divided into smaller network, each with its own sets of IP addresses; identify how many
computers with unique IP addresses can be in the network. So, by splitting our network into
subnets is possible control the flow of traffic using by example route maps enabling to
identify threats, close the entry points and target your response easily, improve network
performance and speed, reduce network congestion, boost network security, control
network growth, easy administration and this provide security to the system.
According to worldwideservices.net, “downtime refers to periods when a system cannot
complete its primary function”. This mean that can be a hardware failure and to minimise
the impact of hardware failure we can make regularly test server backup, check our
facilities, monitor our devices, regularly update devices. In this way this can help to increase
the network security.
Design a maintenance schedule to support the networked system
According to networklessons.com, “network maintenance basically means you have to do
what it takes in order to keep a network up and running and it includes a number of tasks”.
To increase computer network functions, we need a network maintenance plan. In the
latest years we have advancements in technology with a range of new software packages
gadgets and connections platforms and this need advanced network capabilities, to benefit
of these advancements, we need to provide routine support and maintenance to our
network.
A solid network monitoring and maintenance plan will ensure that all the important
aspects of the network are monitored for potential falls in key areas of the network:
antivirus system, systems log, hard drives, thus will reduce downtime incidents. By proactive
maintenance plan we can increase reliability and will result in satisfaction and security, and
customers and clients will find our network reliable, trustworthy to deal with, which is very
important in a competitive environment.
By using a network maintenance plan, we will save money because when the entire
system is down maybe very costly for a business: lose countless business hours, paying a
very high one-time service free and fixing a damaged system cost more than a scheduled
maintained plan. Another solution is optimised connectivity because data run constantly
whenever users access resources in other computers, depends on network layout and
number of active computers and the time takes to retrieve data can be different and a good,
maintained network ensure an optimised connectivity and clients, customers will easier
access data in less time.
If we think about security, poorly maintained networks will make networks more
vulnerable to viruses and Trojan attack, remote hacking because network is connected to
the internet. A good network monitored and maintenance plan will be enhanced security. If
in one of the systems in the network will be a data lose, a damage, can be a huge lose and
can even lock operations in the entire network, and if we do not have any network solutions
repairing the damage is a challenge. By network monitored and maintenance plan we will
provide a backup storage that virtually will give us the possibility to restoring and repairing
any system in the network.
Scheduling regular hardware and software updates is part of a successful network
maintenance plan for performance and security defences. Pre-emptive network repairs
refer to using auto generating reports before problems turn essential. If small troubles go
ignored for long time can be very expensive to fix it, but a network maintenance provider
will be able to recognise if there is a simple fix and if not, we will receive suggestions on the
most cost-effective solution, for example.
According to worldwideservices.net, “an essential part of maintaining your network is
making sure that all of your tools are compliant with your company’s policies and legal
regulations”. This means that is critical to protect the customers, but we need to have as
priority compliance. There are a couple of different approaches for maintaining a network
“there are two main philosophies behind maintaining your organization’s network — with
only one fitting a true preventative-plan definition”, worldwideservices.net suggested:
interrupt driven (network testing on troubleshooting occurs after the detection of the
problem); structured system updates and activities are done every day and minimise service
disruptions by discover anomalies before they run across the systems.
According to SolarWinds, “troubleshooting VM performance issues can be an important
step in making sure your VMs run smoothly and efficiently. Common VM problems include
VM sprawl, data and memory capacity restrictions, data transmission bottlenecks, and
inefficient CPU performance”.
Use critical reflection to evaluate own work and justify valid
conclusions.
We have set up the Active Domain, which is storing information about users and objects,
is like a database and is using Lightweight Directory Access Protocol, which is an internet
protocol that is used to access an Active Directory and according to extrahop.com, “LDAP
stores this data by way of records which contain a set of attributes”.
I did configure a Domain Controller (DC) which is a server that responds to authentication
requests (authentication, permission verification and so on), which controls each source, I
can give the IP address.
Virtual machines have the advantage that what runs inside cannot affect the host system,
apart from the file size, because the Virtual Machine will share the RAM with the host
machine and it is stored in files. The network is configured in the "bridge" system, that
means we allocated IP addresses. We can share and store information, we can create
shared files. Virtual Machine, by default do not have access to files on other virtual machine
or on the host, and if we want to provide that access, we must set up shared folders in our
virtual machine app. To help the guest operating system inside the virtual machine and
understand what is up, virtual machine presents the shared folders as network files shares,
so the guest operating system accesses a folder on our PC like accessing a shared folder on a
network.
We have even permanent folders that are shared until we remove them. In other words,
we can access remote files and for virtual machines the network between host and guest is
virtual since they will be on same real machine.
The scope of DHCP is set just to shut the IP addresses which are used wireless.
When I created my Virtual Machine one of the problems was to connect the two virtual
machines for unit 2 and even if I followed the instruction the computers did not ping each
other. I tried to turn off Windows firewall (firewall can create a disturb of connection when
need to ping the computers). Both networks been set up on VirtualBox to bridged, so ping
from server to PC may not work due to server firewall settings, the PC was connected to the
Domain. In order to get around the firewall on the PC, I enable “file and printer echo
request” on the inbound rules within Windows Defender, like this I allow ping in both
directions, providing the PC is on the Domain, both devices are on and the network settings
within VirtualBox I set to “bridged adaptor” and this fix the issue.
After I fix this problem, the two machines were not running in same time, so I choose to
change, to decrease the base memory and its started to run, but its take a few second to
load and start.
Another problem was when I try to connect the client to the server’s domain, it let me
enter the login information in that moment but after I entered, it goes back to saying it
cannot find the Domain. I create a user for the client to use when connecting to the domain
and I fixed the problem.
Bibliography
LDAP Protocol: Definition & How It Works | Protocol Support Library | ExtraHop,
(Accessed 22nd January 2021)
Network Maintenance (networklessons.com), (Accessed 19th January 2021)
Virtual Machine (VM) Troubleshooting | SolarWinds, (Accessed 21st January 2021)
What Is Network Maintenance? | Network Maintenance Plans & Tips
(worldwideservices.net), (Accessed 19th January 2021)
What is Network Downtime? | Unplanned & Planned Downtime (worldwideservices.net),
(Accessed 19th January 2021)
Withers, S., (10th February 2005), 10 ways to improve network performance | ZDNet,
(Accessed 18th January 2021)
Download