Unit 45 Wide Area Networking Technologies Assignment

Home
breadCrumb image
Solution
breadCrumb image
Unit 45 Wide Area Networking Technologies Assignment
Unit 45 Wide Area Networking Technologies Assignment
Unit 45 Wide Area Networking Technologies Assignment

Unit 45 Wide Area Networking Technologies Assignment -  Assignment Help UK

Introduction

The Unit 45 Wide Area Networking Technologies Assignment is prepared to analyze the use of different WAN technologies and their role in increase the performance of the organization. London College of Education has been taken in the research and recognize the importance of trust systems in WAN. The project provides a detail glimpse about WAN and related evaluation techniques and models to overcome security related issues by using troubleshooting and firewall devices.

Unit 45 Wide Area Networking Technologies Assignment -  Assignment Help UK

1.2 WAN traffic intensive services

Quality of service can be measure with help of several parameters such as delay, delay variation, bandwidth (max data transfer rate) and packet loss rate etc. DSCP (Differentiated ServiceCode Point) marks packets entering the network with a certain class and Ingress Nodes can support complex functions and scalability of DiServ is much better. However it does not keep per ?ow state  information and knowledge  so difficulty raise to support end-to end QoS. IP precedence includes type of services in packet prioritization to create up to 8 priority levels. Voice over IP is a group of technologies use for delivery of voice communication and multi-media sessions over IP. VoIP telephone calls are similar to traditional digital telephony and include digitization of the Analog voice signals and encoding techniques. The below figure displays the working of VoIP

VoIP network -  Assignment Help UK

Task 2

1.3 and 1.4 WAN concerns and make recommendations to sustain network security issues

Different WAN technologies can be used to overcome network security and reliability issues that are described as follows:

  • MD5: It is a widely used cryptographic hash function and it provides some assurance that a transferred file and user can match checksum of downloaded file with already existing files. As well as it also provides error check-sum functionality and assists user to recognize a corrupt or incomplete download more likely when downloading large file. In MD process input message is broken up into chunks of 512-bit block and commonly it used to check the integrity of files. MD5 is widely used to store passwords. In digital signature it is used for providing guarantee consistency on transaction. The algorithm working as describes as follows:

MD5 Algorithm -  Assignment Help UK

  • The transaction process starts when sender creates input message (M) and computes it with message digests (sMD). On the other side receiver gets the message (M-esMD) and extracts encrypted message digest (esMD). Further receiver computes own message digest (rMD) with received message (M).Message was not modified during the data transmission, when both message digests are equal.
  • Broadcast reduction system is a logical domain of computer network which is use in noise reduction. By using broadcast each node are connecting with each other at data linked layer.
  • Filters are Analog circuits which perform signal processing functions and commonly it is used in removing unwanted frequency components from the signal. Different types of digital filters can use by organizations such as active, passive, high pass, liner and non-linear etc.
  • Firewall is a network security system that is monitoring over incoming and outgoing messages. It is working as a software solution and as a hardware appliance.  Firewall protects computer or network from unauthorized users by acting as a gate through which all data must pass. System performance can also affect by it because it verify every packets and lot of time is taken in verification process.
  • Access control lists can be used to assign permission to non-existent nodes and stores permission safely separately from the content in an appropriate manner.
  • VPN tunnels allow remote clients to tunnel into our network that the underlying network does not support or provide directly. It enables one network to send its data via other network connections. It can be used to carry the packets that actually provide the service not normally provided by the network.  Major drawbacks of tunnels are that they are not easily moved (Jason and Thomas, 2012).

Task 3

2.1 Design a WAN infrastructure to meet given requirement

As per the requirement we have organization xyz in New York and there are 30 users in the company. They will be using ctrix application which is hosted in Dallas data centre there are two branches in Washington and Chicago . All sites are connected each other . As per citrix team bandwidth is required 130 kbps per user . To fulfil this Recruitment planning  we need 5 mbps link from two service provider. We have procured below devices. Details are as follows

  • Two  Routers (each location)
  • Two firewalls (each location
  • Two 3750 core switches (each location )
  • One 3750 switches (each location)

We are using WAN routing protocol (Network Technology) eigrp. Based on technology we have applied routing policy for the load balancing. Load balancing is required when there are two ISP link and we  need utilize both. Load balancing is very good technology nowadays. Every organisation is using the  for load sharing. We are using ipsec tunnel as security provide to make our data traffic secure and  encrypted . MD5 and 3 des algorithm has been used for data encryption.

2.2 Critically evaluate the suitability of WAN components.

Device

Quantiity

Cost per unit (£)

routers

6

(6*1000 ) 6000

switches

9

(9*500 ) 4500

Firewall

6

(6*1000 ) 6000

Cat 5e

3000 meter

( 3000*20) 60000

PC

30

(300*30)9000

Task 4

3.1, 3.2 and 3.3  Build and configure a WAN (including services) to meet a given requirement and Implement network security on a WAN and review and test a WAN

Subnet allocation

Site

bit

10.99.1.0

Dallas

24

10.99.2.0

New York

24

10.99.3.0

Washington

24

10.99.4.0

Chicago

24

IOS Command  Line Interface - Assignment Help UK

IOS Command  Line Interface - Assignment Help UK

IOS Command  Line Interface - Assignment Help UK

Dallas location configuration - Assignment Help UK                                               

Contact us

Get assignment help from full time dedicated experts of Locus assignments.

Call us: +44 – 7497 786 317
Email: support@locusassignments.com
 
BTEC HND Assignment Experts - Assignment Help UK

Chicago location configuration

Step by step process of implementation on  WAN network

Router- configuration
Router-Dallas>configure terminal
Router-Dallas(config)#interface se
Router-Dallas(config)#interface serial 0/0/0
Router-Dallas(config)#ip address  10.99.1.2 255.255.255.0
Router-Dallas(config)# no shut down
next we have configuration firewall port that direct connected to router

Firewall configuration
FW-Dallas>configure terminal
FW-Dallas(config)#interface gig0/0
FW-Dallas(config)#ip address 10.99.1.3 255.255.255.0
FW-Dallas(config)# no shut down
Ping ip address from firewall to router
C:\ >ping 10.99.1.2
Pinging 10.99.1.2 with 32 bytes of data:
Reply from 10.99.1.2: bytes=32 time=1ms TTL=255
Reply from 10.99.1.2: bytes=32 time=1ms TTL=255
Reply from 10.99.1.2: bytes=32 time=1ms TTL=255
Reply from 10.99.1.2: bytes=32 time=1ms TTL=255
Ping statistics 10.99.1.2:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms

next we have configuration access switch port that direct connected to FW
switch-Dallas>configure terminal
switch-Dallas(config-if)# vlan 10
switch-Dallas(config-if)# name server
switch-Dallas(config-if)# exitswitch-Dallas(config)#intraange fa0/10-22
switch-Dallas(config-if)# switchport mode access
switch-Dallas(config-if)# switchport mode access vlan 10

Read About: Unit 5 Aspects of Contract and Negligence Sample Assignment 

New York location configuration
tep by step process of implementation on  WAN network
Router configuration
Router-New York>configure terminal
Router-New York(config)#interface se
Router-New York(config)#interface serial 0/0/1
Router-New York(config)#ip address  10.99.2.2 255.255.255.0
Router-New York(config)# no shut down
next we have configuration  firewall port that direct connected to router

Firewall configuration
FW-New York>configure terminal
FW-New York(config)#interface gig0/1
FW-New York(config)#ip address 10.99.2.3 255.255.255.0
FW-New York(config)# no shut down
next we have configuration access switch port that direct connected to FW
switch-New York>configure terminal
switch-New York(config-if)# vlan 12
switch-New York(config-if)# name New Yorkserver
switch-New York(config-if)# exit
switch-New York(config)#intraange fa0/10-21
switch-New York(config-if)# switchport mode access
switch -New York(config-if)# switchport mode access vlan 20

After configuration of  New York location we are able to ping Dallas ip addressfrom New York PC
Ping ip address from firewall to router
C:\ >ping 10.99.1.2
Pinging 10.99.1.2 with 32 bytes of data:
Reply from 10.99.1.2: bytes=32 time=47ms TTL=255
Reply from 10.99.1.2: bytes=32 time=44ms TTL=255
Reply from 10.99.1.2: bytes=32 time=46ms TTL=255
Reply from 10.99.1.2: bytes=32 time=48ms TTL=255
Ping statistics 10.99.1.2:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 44ms, Maximum = 48ms, Average = 46ms

Washington location configuration
Step by step process of implementation on  WAN network
Router configuration
Router-Washington>configure terminal
Router-Washington (config)#interface se
Router-Washington (config)#interface serial 0/0/1
Router-Washington (config)#ip address  10.99.3.2 255.255.255.0
Router-Washington (config)# no shut down
next we have configuration  firewall port that direct connected to router
Firewall configuration
FW-Washington>configure terminal
FW-Washington (config)#interface gig0/1
FW-Washington (config)#ip address 10.99.3.3 255.255.255.0
FW-Washington (config)# no shut down
next we have configuration access switch port that direct connected to FW

switch-Washington>configure terminal
switch-Washington (config-if)# vlan 12
switch-Washington (config-if)# name New Yorkserver
switch-Washington (config-if)# exit
switch-Washington (config)#intraange fa0/10-21
switch-Washington (config-if)# switchport mode access
switch -Washington (config-if)# switchport mode access vlan 20
After configuration of   Washington location we are able to ping Dallas and New York  ip addressfrom Washington PC
Ping ip address from firewall to router
C:\ >ping 10.99.1.2
Pinging 10.99.1.2 with 32 bytes of data:
Reply from 10.99.1.2: bytes=32 time=47ms TTL=255
Reply from 10.99.1.2: bytes=32 time=44ms TTL=255
Reply from 10.99.1.2: bytes=32 time=46ms TTL=255
Reply from 10.99.1.2: bytes=32 time=48ms TTL=255
Ping statistics 10.99.1.2:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 44ms, Maximum = 48ms, Average = 46ms
Ping ip address from firewall to router
C:\ >ping 10.99.2.2
Pinging 10.99.2.2 with 32 bytes of data:
Reply from 10.99.2.2: bytes=32 time=47ms TTL=255
Reply from 10.99.2.2: bytes=32 time=44ms TTL=255
Reply from 10.99.2.2: bytes=32 time=46ms TTL=255
Reply from 10.99.2.2: bytes=32 time=48ms TTL=255
Ping statistics 10.99.2.2:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 44ms, Maximum = 48ms, Average = 46ms

Task 5

4.1 Monitor and troubleshoot a WAN

We have taken one desktop and installed monitoring application ex Eheath and MRTG for traffic monitoring . From Ehealth we get the information like CPU , RAM and critical logs of the devices . And from MRTG we get information like link utilization and bandwidth utilization. Whenever user face any problem like latency and slowness of the application we use this monitoring application to analyse the issues. For the security , we have installed syslog application which monitor the Firewall traffic . If any unwanted request , Trojan etc hits on the Firewall , we gets alert immediately on syslogs . Based on alerts , we analyse the logs and implement the new rules on the firewall  which increase the reliability and performance of the network .

4.2 Resolve WAN issues to improve security, reliability and performance.

To resolve the WAN  network operating system  issue , we login to the WAN devices and check the CPU , RAM and Link utilization . if we see any errors and abnormality on WAN Links , we troubleshoot the issue by putting the commands (show interface WANPort). Based on that we check whether it is problem on service provider or our end. With the help of monitoring tools if errors and issue occurs we get auto generated mails  which help us to troubleshoot the issue before user reports. It minimise downtime and production loss of the company.

4.3 Critically evaluate the performance of a WAN

Purpose of this project and design to setup network of an organization so that user sitting in HQ and branches can access citrix application hosted in Datacenter. We have deployed best equipments and good configuration with security measurement . There are five recommendation which can still make our network better below are those:

  • We can install IPS for inspection on packet level.
  • We can install riverbed to optimise WAN traffic.
  • QOS can be applied to prioritise the traffic.
  • We can create separate zone on Firewall to segregate the server and user traffic due to security reason.
  • We can also do NAT to hide our organization subnet to route it on public network.

References

Carol, X,,2013. Computer?mediated communication and social networking tools at work. Information Technology and People. 26 (2). PP.172 – 190.
Morten H. A., 2011, Sensemaking in Networks: Using Network Pictures to Understand Network Dynamics, in Roger Baxter, Arch G. Woodside (ed.) Interfirm Networks: Theory, Strategy, and Behavior.17. Emerald Group Publishing Limited. PP.1 – 197.
Jason B. F. And Thomas L. M., 2012. Tools for interdisciplinary design of pervasive computing. International Journal of Pervasive Computing and Communications. 8. PP.112 – 132.
Sheynblat, L., Krasner, N. F., 2004. U.S. Patent No. 6,677,894. Washington, DC: U.S. Patent and Trademark Office.

Locus assignment help is provided by the industry's top most qualified writers with the guaranteed good marks, We are posting units solutions so scholars can explore the our  Assignment Help UK  and get review the quality of our work.

FAQ's