Order Now

Computer Network Using Ciscopacket Tracer Assignment Sample

6500 Project Delivered
4.8/5 User Rating

Computer Network Using Ciscopacket Tracer Assignment Sample

Introduction

Get free samples written by our Top-Notch subject experts for taking online Assignment Help services.

The designed network comes with DHCP and RIP configuration over the routers where security techniques also have been implemented. Subnetworks have been configured with predefined link-local addresses to transmit data from one host machine to another. In this report, subnetworks have been designed through (Dynamic host configuration protocol) routing and routers have been connected with (routing information protocol).  Network configuration comes with the process of setting network control and support of network device configuration and communication between them. Multiple configuration and setting up the process of network devices has been implemented through DHCP uni-cast routing and RIP network protocol (Akashi and Tong, 2019). Policies and network data flow between the network devices will be visualized to establish the physical; connection between the network devices. Physical devices as network appliances will be replaced by software configuration by removing the extension of manual network configuration. 

Concepts in data communication 

Data communication process comes with the proper connection between the network devices where proper IP addressing, network sub netting and unicast routing process have been applied. IP addressing in network devices specifies the rule of proper communication between other hosts over the internet. Specific routes will be identified through IP addressing scheme, and predicted data will be transferred (Yaibuates and Chaisricharoen, 2019). Subnetting divides a network into different branches that enhances the network capabilities. 

Unicast routing 

Unicast routing provides forward unicasted traffic where it connects with source and destination for a unique addressing. Communication between subnets will be easy to implement where network devices will be connected with a predefined link local addresses. RIP comes with dynamic routing that identifies the best route to transfer data from source machine to destination as it also helps to update the network periodically with routing information. Full routing tables will be sent with the latest updates through this routing protocol as routers are always depend upon the information passed between the neighbor routers. It is a classful routing protocol that does not sent information of it subnet mask to their routing update.  

Objectives and overview

The report objectives are- 

  • To analyze a computer-based network using CISCO packet tracer 
  • To implement DHCP and RIP configuration over the network devices 
  • To simulate the designed network using packet tracer 
  • To implement TELNET, AUX port, console and enable password over the network routers 

The network design comes with a star network topology where each workstations or host machine are connected with a unique network router that posses a star system to transmit files or data from one sub network to another. The designed network configuration comes with the successful packet transmission between each subnetwork where routers have been configured with RIP protocol.  Six different sub networks have been designed with a unique routing address, subnet mask and gateway address. The subnet mask and host IP addresses has been generated through DHCP routing protocol where the values are auto generated. The sub networks have been connected with different cables through their network devices. Security implementation provides more security to the network where enabling passwords provide high user authentication for the network access (Nuhu et al. 2020). RIP configuration has been implemented over the two routers where the routing address of router serial port has been stored in the router RIP configuration. 

Security implementation 

The network router works as the barrier between the sub network branches, in this report the barrier of branches has been secured through password implementation on the router terminal (Zeng et al. 2018). Based on the security router console password, Telnet password, AUX port password and enable password has been implemented. The console password comes with the base password security in  a router to turn on the router console password has been implemented, after that to enable the routing configuration enable password has been implemented on router terminal, whereas the Telnet password comes after these two password security that secures the network admin (Sulaiman et al. 2018). AUX port password secures the auxiliary port of a router that mainly works as a “backup async” port. Password security provides the bas security with enhancing the router access where remote router management and other functionality can be also implemented.

Evaluation of the designed network

Evaluation of the designed network comes with successful packet transmission and configuration such as ping testing or PDU testing. Successful packet transmission between the network devices provides the proper connection between the devices where network communication has been easily implemented. The simulation terminal comes with the results of packet transmission between the network devices where the status will provide the successful or failed data transmission between the network devices.  

The designed network transfers information through its allocated IP address and specified routes. 

Conclusion

The analysis of the designed network concludes that 

  • Proper connectivity with network devices 
  • TELNET, AUX port, console and enable password implementation
  • DHCP and RIP over network routers for better configuration 

Security transmission and proper connection between the network devices comes with the crucial aspect of network connectivity. In addition the values will be generated through successful packet transmission between the network devices. This network router provides extra security process through password implementation in the router terminal. The network configuration provides higher security in the time of data transmission through specific routes. DHCP and RIP provides more accurate configuration in the network IP addressing scheme. Security implementation provides more security to the network where enabling passwords provide high user authentication for the network access. 

It’s Time to Boost Your Grades with Professional Help
  • Improved Scores

    Get Better Grades In Every Subject

  • Timely Delivery

    Submit Your Assignments On Time

  • Experienced Writers

    Trust Academic Experts Based in UK

  • Safety is Assured

    Your Privacy is Our Topmost Concern

Rapid Assignment Help
Just Pay for your Assignment
  • Turnitin Report
    Free
  • Proofreading and Editing
    Free
  • Formatting
    Free
  • Unlimited revisions
    Free
  • Quality Check
    Free
  • Total
    Free
Let's Start
35% OFF
Get best price for your work
  • 6500+ Projects Delivered
  • 503+ Experts 24*7 Online Help

offer valid for limited time only*