Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)
NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.
NB: All your data is kept safe from the public.
Introduction
Standardization configuration of DeVry’s campus network will enable various VLAN members to share information very easily. Nevertheless, at this juncture the standardization initiative must embrace the needs of traffic patterns, design requirements and camera density. As such, this report will address the configuration issues which pertain to the various elements of the network.
Four camera VLANs
Four Camera VLANs will require the installation of cameras to be IP oriented and will be operated in VLAN 600. The cameras will be controlled by 2 switches with a port access such as Cisco 2960 which must embrace the standard requirements. Operation from the switches will enable operators to communicate easily with the server In this case, SF302-8P is highly recommended since the cameras will be operating in a highly populated environment (Samuel, 2009).
Local VLAN database
Local VLAN database, the guiding principle in this configuration is to operate the size of a particular layer 2 section network to ensure that communication and traffic density does not exceed the capacity of the network section. This scenario applies to DeVry’s campus network given the high traffic and data. To transfer data, VLAN must be recognized by the switches mentioned above. Configuration of the local VLAN will also be identified from a switch which has the Trunking Protocol database (Samuel, 2009).
Standard trunking protocol with nondefault native VLAN
Standard trunking protocol with nondefault native VLAN enhances identification of VLAN data frames that are moving between the switches. This also enables the trunks to carry traffic from the VLANS within the network; moreover, they will also be modified to carry particular VLAN traffic. The trunking mechanisms to be used will be configured according to Cisco switch configurations.
Nonstandard management VLAN
Nonstandard management VLAN system works with command switch to automatically recognize a new switch that has not be configured. In this regard, the command switch delivers instructions to the nonstandard management to ensure conformity. Prior to the inclusion of a new switch, the network cluster must be linked to the port where VLAN management cluster can be accessed (Samuel, 2009).
Standard hostnames
The standard host names will be developed according to the proffered set of host names. As indicated in RFC #226. The host names to be used in this network will comprise of at least 6 characters. The guideline to be used will identify the site and the machine. The users will rely on keywords of the site, standard acronyms, or standard abbreviation. However, in case the network team finds the above recommendations inapplicable, selected mnemonics will be used.
Local authentication database
Authentication of the database will enhance data security in the organization. Configuration of the network privileges is therefore important to enable the campus network administrators to enhance efficiency and protection of vital information. In this case, privilege authentication will be achieved by using a switch that embraces AAA mode of authentication (Samuel, 2009).
SSH transport for VTY ports
SSH transport for VTY ports will enable the above mentioned authentication to work. Therefore, to achieve this network engineers will incorporate enabled AAA model to particular specified AAA authentication. This also involves identifying the AAA authentication to be pursued for instance, whether it is tacacs, local based or radius (Samuel, 2009).
Password-protect on all out-of-band management ports
Password-protect on all out-of-band management ports are very important for the campus to provide adequate security control. The initiative will enable the network users to ensure improved productivity due to elimination of potential interferences. To attain this, the network engineers will use 1700 which is the best catalyst out-of-band management to arrange, examine and test the each port.
Naming standards for all devices
The naming standards for devices are very important when conducting an audit on the performance of both hardware and software devices used in the network system. The audit is also useful in providing configuration adjustments for improving the performance. Cisco based standards such RME is applied in auditing device performance and provides information on different modules, hardware and software devices (Samuel, 2009).
Cable identification
Cable identification in network system is very important to enhance efficient network operations. The most reliable identification method to be used in this case is Cad-Connect labeling system which is essential in saving time and elimination of errors by using prior CAD files that reduces manual operations in data entry.
IP addressing scheme using RFC
IP addressing scheme using RFC 1918 addresses to be used in this case is 10.0.0.0/8 which is recommended for private organizations such a campus. This is chosen because it operates TCP/IP without difficulties. However, IP addressing scheme will only be limited for use within the internal network since it tends to limit connections with other external networks such as the public network system.
Indication of how devices will acquire addresses
IP addressing scheme identifies network device assignments, subnet assignments and size of the subnet. The IP address to be used in this case will reduce chances of overlapping or duplicating the subnets. This relies on established IP standards which automatically assigns addresses within particular subnets from routers to switches.
VLAN membership
The VLAN membership recommended for the network will be Dynamic VLANs where switches delegate the ports to the VLAN by relying on the information from applier device through IP address. This therefore reveals the devices which obtain addresses through IP address system (Samuel, 2009).
Concerns on the current network design
Since the organization will adopt switch oriented network system, concerns will emanate from issues of design as many of the campus network administrators are not used to the new system. Adapting the new network topology may therefore come with some challenges which emanate from difficulties in mastering the switch based system.
Reference
Samuel, F. (2009). Octopus: The Lawrence Radiation Laboratory Network. Rogerdmoore.ca. Archived from the original on 2012 VLANs.345-350
Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)
NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.
NB: All your data is kept safe from the public.