Answer To: ICTNWK517 DETERMINE BEST-FIT TOPOLOGY FOR A WIDE AREA NETWORK ASSESSMENT TASK 2 FEEDBACK COVER SHEET...
Lokesh answered on Jun 06 2021
ICTNWK517 DETERMINE BEST-FIT TOPOLOGY FOR A
WIDE AREA NETWORK
ASSESSMENT TASK 2
FEEDBACK COVER SHEET
STUDENT NAME
STUDENT ID
ASSESSOR NAME
EVIDENCE COLLECTED
BENCHMARK REQUIREMENTS MET
1st Attempt
2nd Attempt
3rd Attempt
1. WAN Specification Report
· ☐
☐
☐
1. WAN Design Topology
· ☐
☐
☐
1. WAN Configuration Document
· ☐
☐
☐
OUTCOME
☐Satisfactory
☐Not Satisfactory
☐Satisfactory
☐Not Satisfactory
☐Satisfactory
☐Not Satisfactory
DATE
/ / 20
/ / 20
/ / 20
ASSESSOR INITIAL
FEEDBACK TO STUDENT
ASSESSOR SIGNATURE
DATE of FINAL OUTCOME
Task 2: WAN Specification Project
Assessment tasks
To achieve competency in this unit you need to successfully complete all assessment tasks:
· Task 1: Knowledge Questions
· Task 2: WAN Specification Project
Submission details
All tasks are to be submitted electronically via Canvas, with any required evidence attached.
Performance Objective
For this task, you will demonstrate the skills and knowledge required to make a wide area network (WAN).
Assessment task description
For this task you will identify the best way computers and local area networks (LANs) can be connected to make a wide area network (WAN) for a case study organisation.
Assessment task introduction
The project includes two main sections: Procedure and Specifications. You are required to understand the difference between these sections:
· Procedure - this section describes all the requirements that are needed to be submitted step by step. You DO NOT need to answer in this part.
· Specifications - this section specifies what the student MUST include as part of the project. You are required to insert an object (a document) under each of the requirements. To be deemed ‘Satisfactory’ for this project, all the requirements under the Specifications need to be submitted and completed in accordance with Skills Australia Institute’s ‘Student Handbook’ (under ‘Training and Assessment’ section).
Procedure
1. Carefully read the following scenario
Grow Management Consultants is a leadership consultancy business based in Sydney. Recently the company has expanded and set up another office in Brisbane. Due to the expansion, the company needs to implement a Wide Area Network (WAN) to connect both branches through a leased VPN.
Currently the company uses computers with a Windows Operating System and Office 365. Files are currently shared via Dropbox but the company would like to move towards an Intranet system as part of the WAN.
The Sydney LAN includes one (1) network router and one (1) VPN edge router, 2 switches, two (2) DNS, mail server, wireless access point, firewall, ten (10) VoIP phones and content server and 50 computers. See Sydney Topology Diagram below
The following equipment will be installed in the Brisbane office.
· 45 Computers
· Wireless Network connecting a Wireless printer
· Network Printer and Scanner
· VPN Edge Router
Skype is also used for meetings with clients and internally. The Brisbane network must be secure access to the internet through a local ISP and resolve IP addresses locally. The VPN service will be used to access the content server in Sydney so that files can be shared between both LAN computers include videos (part of the company’s webinar offerings) and documents including text and images such as marketing materials.
The company requires a WAN network implemented through the use of a leased VPN service from a national Telco. The company’s budget for this is $30,000
LAN Design
(Sydney Diagram)
WAN Specification Template
WAN Configuration Document
2. You will need to access the following files to complete this assessment
Vendor product catalogues such as at:
a. Cisco: https://www.cisco.com/c/en_au/products/routers/index.html
b. FortiNet products: https://www.fortinet.com/products.html
c. Dlink: https://www.dlink.com.au/home-solutions/connectivity/routers
d. TPLINK: https://www.tp-link.com/au/home-networking/wifi-router/
e. Ubiquiti products https://www.ui.com/edgemax/edgerouter-lite /
3. Identify WAN needs and create a WAN specification
You are required to review the given network topology diagram for the existing office in Sydney. You also need to review the network requirements for the new office in Brisbane.
Based on your review of the network topology diagram and the requirements for Brisbane, you are required to develop a WAN Specification that includes:
· A description of the current LAN that is in place in each office. Give an analysis of the components in the LAN, and any improvements that can be made to the existing network.
· Your design topology for the Brisbane network which meets the network requirements outlined above. As part of the proposed solution you are required to identify the LAN, WLAN and VPN segments for the proposed WAN between Brisbane and Sydney. Make sure you identify the segment, as well as what should be included in each segment. Make sure you include any required additional network elements for Sydney network to make this design feasible.
· An explanation on how the company’s physical environment and business requirements impacted on the WAN design created, include the WAN functional matrix for your design.
· Your estimate of the bandwidth required according to the scenario information and based on expected traffic content and volume. You should also include the download and upload speed required for each branch site. Refer to the Telco Services Costing Document to select the most appropriate option for the main leased VPN and the backup VPN.
· An outline of the various components of the proposed WAN network and that includes the network components, network segment and functions. Use the table in the WAN Specification Template to document your answers. Ensure there are no single points of failure in your design.
· Vendor options and costs for each of the network components you are proposing (include at least three options).
· An outline of the most appropriate WAN design considering budget considerations, reliability, and bandwidth, refer to the Telco Networks Costing sheet.
· A design for redundant links in the proposed WAN connectivity for link backup purposes, in case the main link is disrupted.
Use the WAN Specification Template to document your report. Include the topological design of your network. Ensure you include screen shots of each part of the WAN design.
4. Document the configuration
· Document the WAN configuration for IP addresses in the Configuration Template
5. Submit the files to your Assessor as per the specifications below. Ensure you keep a copy of all work submitted for your records.
Specifications
You must submit:
Assessment evidence
Inserted document
· WAN Specification Report
· WAN Design Topology
· WAN Configuration Document
Your Assessor will be looking for:
Writing skills to develop material for a specific audience, using clear and detailed language to convey explicit information, requirements and recommendations
Numeracy skills to undertake complex functional calculus to develop a WAN functional matrix and to interpret numerical data to estimate traffic needs and calculate business expenses
Get the work done skills to demonstrate a sophisticated understanding of principles, concepts, language and practices associated with the digital world, to use digital tools to access and organise complex data and analyse multiple sources of information for strategic purposes and to operate from a broad conceptual plan, developing the operational detail in stages, regularly reviewing priorities and performance during implementation, and identifying and addressing issues with reference to resource constraints
Document Name: ICTNWK517 AT2 WAN Specification Project
RTO Code: 52010
CRICOS Code: 03548F
Version: 1.1
Approved on: 02 Oct 2020
Review Date: 02 Oct 2022
Page 6 of 6
This document is WAN Specification Template.
It is part of the supporting resources for Assessment Task 2 of ICTNWK517.
WAN Specification Template
Existing LAN
Provide a description of the current LAN that is in place in the Sydney office. Your description should include the following:
i. Network Topology
ii. Two (2) network flaws in the current design and suggestions for resolution
iii. Network security measures implemented.
Required LAN, WLAN and VPN segments
Identify and outline the required LAN, WLAN and VPN segment components for the proposed WAN connecting Sydney to Brisbane. List the devices in each segment in your design. Make sure you identify the segment, as well as what should be included in each segment (use screen shots to show your proposed segments). You may use the table below.
Branch
Network
Components / Network Segment
Functions/ Purpose
Sydney
LAN
WLAN
VPN
Both branches
WAN
Brisbane (based on your topology)
LAN
WLAN
VPN
Physical environment and WAN
Explain how the company’s physical environment impacted on the WAN design created.
Bandwidth required
Your estimate of the bandwidth required should be according to the scenario information and based on expected traffic content and volume. You should also include the download and upload speed required.
WAN components
Include a topological design of the Brisbane network. Outline your choice of the various components to implement the proposed WAN network (excluding the Telco network). Select the appropriate leased VPN service based on the budgetary constraints of the organisation and the functional requirements.
Brisbane Topology Design
Vendor options and costs
Cost the equipment and VPN selection based on your design of the Brisbane network and the improvement proposal you made for the Sydney network. Vendor options and costs for each of the components you are proposing.
Sydney Network Improvements
Product Description
Segment (VPN , WLAN , WAN or LAN)
Unit price (ex. GST)
Quantity
WAN design
Outline the most appropriate WAN design taking into account budget considerations, reliability and bandwidth.
Design for redundant links
Propose a backup leased VPN service and explain your choice based on the bandwidth and cost.
Document Name: WAN Specification Template
RTO Code: 52010
CRICOS Code: 03548F
Version: 1.0
Approved on: 14 Sep 2020
Review Date: 14 Sep 2022
Page 1 of 1
Configuration
Documentation.docx
This document is Network Configuration.
It is part of the supporting resources for Assessment Task 2 of ICTNWK517.
Network Configuration
Document the network configuration for the Sydney Branch by performing the following:
(Packet Tracer can be used to generate the configuration based on the topology)
1. LAN IP addressing Scheme
2. WLAN IP addressing Scheme
3. WAN IP address Scheme (including redundant link)
Assume the company has access to the following public IP addresses:
12.246.243.36 /29
Document Name: Configuration Documentation
RTO Code: 52010
CRICOS Code: 03548F
Version: 1.0
Approved on: 14 Sep 2020
Review Date: 14 Sep 2022
Page 1 of 1
Modified.docx
WAN Network
The status of computer and different resources use by the computer for its operation can be viewed through different commands. Some of the basic commands used in computer network are as follows:
· Hostname: Display the hostname of the local computer.
Example c:\> hostname
· Ipconfig/ifconfig: It resembles to internet protocol configuration. It display all current TCP/IP network configuration values. It also allows some control over active TCP/IP connections. Dynamic Host Control Protocol DHCP and Domain Name System DNS can be refresh through this command.
Example c:\>ipconfig c:\> ipconfig /all
Modifiers
Ipconfig /all Ipconfig /renew Ipconfgi /release
· Ping: It is the basic network command used to test reachability of remote host computer and use to measure the round trip time and record any packet loss for the messages sent from originating host. It is operated by ICMP echo request packet sent and waits for its reply.
Example c:\>ping 127.0.0.1 c:\> ping localhost
c:\> ping –t www.google.com c:\> ping –l 100 www.google.com
Note if a ping does fail, you won’t receive any information regarding the nature of the failure. This is where the pathping utility comes in.
· Tracert / traceroute: It refers to trace route. It is used to track the route and measure transit delays of packet . You can see each host that a packet travels through as it tries to reach its destination. You can see how many “hops” from the Slackware web site you are with this command
Example c:\>tracert www.dotnetnuke.com
(
Eg
.
traceroute
-w 3 -q 1
-m
16
example.com
Only wait 3 seconds (instead of 5), only send out 1 query to each hop (instead of 3), limit the maximum
number of hops to 16 before giving up (instead of 30) with the final host
example.com
)
TTL=Time to Live
· getmac
DOS command used to show both local and remote MAC addresses. When run with no parameters (ie. getmac) it displays MAC addresses for the local system. When run with the /s parameter (eg. getmac /s \\foo) it displays MAC addresses for the remote computer
· Netstat: This command shows active TCP connections (both incoming and outgoing), ports on which the computer is listening, Ethernet statistic, the IP routing table, IPv4 statistics(for the IP, ICMP,TCP,UDP protocols).
Example c:\> netstat c:\>netstat –an
c:\>netstat –s –p tcp udp
Netstat provides statistics for the following:
· Proto
The name of the protocol (TCP or UDP).
· Local Address
The IP address of the local computer and the port number being used. The name of the local computer that
corresponds to the IP address and the name of the port is shown unless the-n parameter is specified. If the port is not yet established, the port number is shown as an asterisk (*).
· Foreign Address
The IP address and port number of the remote computer to which the socket is connected. The names that
corresponds to the IP address and the port are shown unless the -nparameter is specified. If the port is not yet established, the port number is shown as an asterisk (*).
· (state)
Indicates the state of a TCP connection. The possible states are as follows:
CLOSE_WAIT CLOSED ESTABLISHED etc
· Arp: It resembles to Address Resolution Protocol. This protocol is used by network nodes to match IP address to MAC (Media Access Control). It displays, adds and remove ARP cache information from network devices.
Example c:\>arp –a
c:\> arp –a 192.168.10.130
· Nslookup: This command is used for querying the Domain Name System DNS to obtain domain name of IP address mapping or for any other specific DNS record.
Example c:\> nslookup
c:\> nslookup www.google.com
· Nbtstat: It displays NetBIOS Network Basic Input/Output System over TCP/IP protocol statistics, NetBIOS name tables for both local and remote computer.
Example c:\>nbtstat –a 192.168.1.130 c:\>nbtstat –c
c:\>nbtstat -n
Note Help Commands
/? : Displays help at the command prompt. Cls : Clear Screen
LANs and WANs
Basic Router Configuration:
1. Get consoled into your router – ensure that no other cables are connected other than the...