Get free samples written by our Top-Notch subject experts for taking online Assignment Help services.
The designed network comes with DHCP and RIP configuration over the routers where security techniques also have been implemented. Subnetworks have been configured with predefined link-local addresses to transmit data from one host machine to another. In this report, subnetworks have been designed through (Dynamic host configuration protocol) routing and routers have been connected with (routing information protocol). Network configuration comes with the process of setting network control and support of network device configuration and communication between them. Multiple configuration and setting up the process of network devices has been implemented through DHCP uni-cast routing and RIP network protocol (Akashi and Tong, 2019). Policies and network data flow between the network devices will be visualized to establish the physical; connection between the network devices. Physical devices as network appliances will be replaced by software configuration by removing the extension of manual network configuration.
Concepts in data communication
Data communication process comes with the proper connection between the network devices where proper IP addressing, network sub netting and unicast routing process have been applied. IP addressing in network devices specifies the rule of proper communication between other hosts over the internet. Specific routes will be identified through IP addressing scheme, and predicted data will be transferred (Yaibuates and Chaisricharoen, 2019). Subnetting divides a network into different branches that enhances the network capabilities.
Unicast routing provides forward unicasted traffic where it connects with source and destination for a unique addressing. Communication between subnets will be easy to implement where network devices will be connected with a predefined link local addresses. RIP comes with dynamic routing that identifies the best route to transfer data from source machine to destination as it also helps to update the network periodically with routing information. Full routing tables will be sent with the latest updates through this routing protocol as routers are always depend upon the information passed between the neighbor routers. It is a classful routing protocol that does not sent information of it subnet mask to their routing update.
The report objectives are-
The network design comes with a star network topology where each workstations or host machine are connected with a unique network router that posses a star system to transmit files or data from one sub network to another. The designed network configuration comes with the successful packet transmission between each subnetwork where routers have been configured with RIP protocol. Six different sub networks have been designed with a unique routing address, subnet mask and gateway address. The subnet mask and host IP addresses has been generated through DHCP routing protocol where the values are auto generated. The sub networks have been connected with different cables through their network devices. Security implementation provides more security to the network where enabling passwords provide high user authentication for the network access (Nuhu et al. 2020). RIP configuration has been implemented over the two routers where the routing address of router serial port has been stored in the router RIP configuration.
The network router works as the barrier between the sub network branches, in this report the barrier of branches has been secured through password implementation on the router terminal (Zeng et al. 2018). Based on the security router console password, Telnet password, AUX port password and enable password has been implemented. The console password comes with the base password security in a router to turn on the router console password has been implemented, after that to enable the routing configuration enable password has been implemented on router terminal, whereas the Telnet password comes after these two password security that secures the network admin (Sulaiman et al. 2018). AUX port password secures the auxiliary port of a router that mainly works as a “backup async” port. Password security provides the bas security with enhancing the router access where remote router management and other functionality can be also implemented.
Evaluation of the designed network comes with successful packet transmission and configuration such as ping testing or PDU testing. Successful packet transmission between the network devices provides the proper connection between the devices where network communication has been easily implemented. The simulation terminal comes with the results of packet transmission between the network devices where the status will provide the successful or failed data transmission between the network devices.
The designed network transfers information through its allocated IP address and specified routes.
The analysis of the designed network concludes that
Security transmission and proper connection between the network devices comes with the crucial aspect of network connectivity. In addition the values will be generated through successful packet transmission between the network devices. This network router provides extra security process through password implementation in the router terminal. The network configuration provides higher security in the time of data transmission through specific routes. DHCP and RIP provides more accurate configuration in the network IP addressing scheme. Security implementation provides more security to the network where enabling passwords provide high user authentication for the network access.
Get Better Grades In Every Subject
Submit Your Assignments On Time
Trust Academic Experts Based in UK
Your Privacy is Our Topmost Concern
Copyright 2023 @ Rapid Assignment Help Services
offer valid for limited time only*